General

  • Target

    70e39f5c8d5130a0e93bc9ebd7287023_mafia_JC.exe

  • Size

    336KB

  • MD5

    70e39f5c8d5130a0e93bc9ebd7287023

  • SHA1

    07cc40f710d7d12f93952e3cff5f0f7193d88f13

  • SHA256

    18fe2cfc49b773a4b4b526025af07654ad3a6b1c7b2572be4a0bfd45bd340938

  • SHA512

    c732b600abbc944478c2d608e94061b08cfbd6627b353322b0a975fbf285a76029c31e68a7fa749cf0ca85a56463dade124ec08883206dc5b9998b76c3aceb1e

  • SSDEEP

    6144:jBcgHq3cDh0zuao5sQyAFCx2HI8w1ihwWzqW4hO/2:jegHfDuQLFCYHT2ih6Wp2

Malware Config

Extracted

Family

vidar

Version

4.3

Botnet

cf11fe7ad567662daa13f9a70672f437

C2

https://steamcommunity.com/profiles/76561199514261168

https://t.me/kamaprimo

Attributes
  • profile_id_v2

    cf11fe7ad567662daa13f9a70672f437

  • user_agent

    Mozilla/5.0 (Linux; U; Tizen 2.0; en-us) AppleWebKit/537.1 (KHTML, like Gecko) Mobile TizenBrowser/2.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 70e39f5c8d5130a0e93bc9ebd7287023_mafia_JC.exe
    .exe windows x86

    a86fa734e02fd4666663da591d581430


    Headers

    Imports

    Sections