General

  • Target

    1144-153-0x0000000000400000-0x000000000046F000-memory.dmp

  • Size

    444KB

  • MD5

    1202a0eaf576cb2a0594c65ce4f7a4a6

  • SHA1

    a8fc0f75a2a0badab70e55d3e11326abbf75c910

  • SHA256

    15aef61a22f5884b4e14075220e846bf9eceffc7ad663947c437b2976c6bb7bf

  • SHA512

    5505140eb7f047ec0c630fb531dc0009c7347a029e8658a661284d5c57c4db8bbcbb794b07fe429c5c1f33fc0b1382ba260b8c24fdc9634234e60b6603d16f6a

  • SSDEEP

    12288:31HG549Wcfm+ZYIV5muWbb4krzdtmkOA:+WWcu+WIvmdd9v

Malware Config

Extracted

Family

vidar

Version

5.3

Botnet

562ce294a991b18054802a17b24ce0f9

C2

https://t.me/buukcay

https://steamcommunity.com/profiles/76561199544211655

Attributes
  • profile_id_v2

    562ce294a991b18054802a17b24ce0f9

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1144-153-0x0000000000400000-0x000000000046F000-memory.dmp
    .exe windows x86


    Headers

    Sections