General

  • Target

    3352-98-0x0000000000400000-0x00000000007E6000-memory.dmp

  • Size

    3.9MB

  • MD5

    6de10b64f6647ac5992ec67c56c21215

  • SHA1

    31811716a9dc812504e2e4a09f1e8621bcc5d88f

  • SHA256

    fefe1e411d1e328ce481dcca3e2551f9d369e96f78f6eef339021640141cec59

  • SHA512

    546bf3a35db531b85cc0486a99095eb033d7e1f04127901a5a553b255d9fc2f924e80fc6f18a639bb9ecf79a0e68ea621bb517876c74a86323853779cdf1b811

  • SSDEEP

    6144:aUNdslLON1aPsi5chCRXmI4/LusZbXm+QRAyNVJCnfhOqU/PBMYUBRi:axGwP/OWOxXm+4AaCn+XKxB

Malware Config

Extracted

Family

vidar

Version

6.1

Botnet

af2b108237a470d5313ebab11ef5d055

C2

https://steamcommunity.com/profiles/76561199563297648

https://t.me/twowheelfun

Attributes
  • profile_id_v2

    af2b108237a470d5313ebab11ef5d055

  • user_agent

    Mozilla/5.0 (iPad; CPU OS 17_0_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.5 Mobile/15E148 Safari/605.1.15

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3352-98-0x0000000000400000-0x00000000007E6000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections