General

  • Target

    880-2-0x0000000000400000-0x0000000002461000-memory.dmp

  • Size

    32.4MB

  • MD5

    80d3e973657412ecd3d365361aa8fccb

  • SHA1

    ab03bdd0b788d28054d17d86757908a8c1403545

  • SHA256

    834f3b5bf20ced17a0f28225f8becaa05a9a1ed2c5d86551027222b64dc3813e

  • SHA512

    a197c5e2a0019f25ffcb5d7574a6f3c950f1998c6469c7630a6ee6e652ec2fceb7053d99f2fd6cd24cd479f41905b54b348154b6167a4a20fa6696d6ee84340f

  • SSDEEP

    6144:nNvC1zqSQz/E+KM9Lys1WIQuWyV3EszeC+SGatS3UnpIbyC3N:nNvC1zqjETs1z/hVBzeC+StIQIbyo

Malware Config

Extracted

Family

vidar

Version

5.4

Botnet

b2ced91faf30889899f34458f95b8e93

C2

https://t.me/vogogor

https://steamcommunity.com/profiles/76561199545993403

Attributes
  • profile_id_v2

    b2ced91faf30889899f34458f95b8e93

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.2.13 (KHTML, like Gecko) Version/16.5.2 Safari/605.2.13

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 880-2-0x0000000000400000-0x0000000002461000-memory.dmp
    .exe windows x86


    Headers

    Sections