General

  • Target

    5116-63-0x0000000000400000-0x000000000046F000-memory.dmp

  • Size

    444KB

  • MD5

    ecf2c8d2ee55f3b9769ca29af2c8d8e2

  • SHA1

    ca9bd72171d0dea5399aa17976a0810d8607932e

  • SHA256

    abe80522b1b7e536f6f56961081745e1a9b12a1b4d673cc3ccb43e9abe4b24f8

  • SHA512

    8900015c2ae52170a65ba81e3b0b1c4efa6c9e57ed328ad08c0e1cf22d03acbf2cf1c6bf07a5f34de314699754f308094fe65b89e68fa70d2695e2cf16a4dec7

  • SSDEEP

    12288:31HG549Wcfm+ZYIV5muWbI4krzdtPkOA:+WWcu+WIvmd66v

Malware Config

Extracted

Family

vidar

Version

5.3

Botnet

562ce294a991b18054802a17b24ce0f9

C2

https://t.me/buukcay

https://steamcommunity.com/profiles/76561199544211655

Attributes
  • profile_id_v2

    562ce294a991b18054802a17b24ce0f9

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5116-63-0x0000000000400000-0x000000000046F000-memory.dmp
    .exe windows x86


    Headers

    Sections