General

  • Target

    1260-106-0x0000000000400000-0x0000000000465000-memory.dmp

  • Size

    404KB

  • MD5

    43d02e779a58440520d2b24cf1c307c7

  • SHA1

    4f20de9e4f940bcddbb16a3584d299ef44851948

  • SHA256

    95fbeb506b88828ccb0883f4078f16bc51b51c395dd27d6f3d442c50913c2a83

  • SHA512

    99b59b37c65ec484379b6afb50607efad3a2da62cad26faed2746c088708ca91a1f1f2be2d8e58aa711a7a2b27a0a6946d8c1835e12ab1f2ffcdf45bc945597b

  • SSDEEP

    6144:OisujIl/IUezxowQpnI4+4uiNIGnRf+xmZZRDZqvhZvSE7:Opn/085AyRf+xKDZqzL

Malware Config

Extracted

Family

vidar

Version

5.7

Botnet

5c0b4a12d6c03dd98ed431d3eded2169

C2

https://steamcommunity.com/profiles/76561199553369541

https://t.me/dastanatg

Attributes
  • profile_id_v2

    5c0b4a12d6c03dd98ed431d3eded2169

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.7 Safari/605.1.75

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1260-106-0x0000000000400000-0x0000000000465000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections