General

  • Target

    2372-142-0x0000000000400000-0x0000000000462000-memory.dmp

  • Size

    392KB

  • MD5

    c8acd804ce63f2664b46c538d16230c2

  • SHA1

    3f78b06b5e53bbaed12d6af406a523ec95e762c4

  • SHA256

    947f5ccae9a79fdd5d49b947ae7d11daaed2bb6e53325d74b342ce4ca2c060b3

  • SHA512

    d338a699e7ae803b28864d6c790d9919003d353201e07da9ce95060494df653af665a2ca52be06af4b46163f0d49c750cb872124e96895c92e0004bd79f21e37

  • SSDEEP

    6144:2RPMRDHFORSboTYtwE826I4W5uQrOXmC/F9BUiqaEPLhkll:lTgY1826tWC99BUiqaEPi

Malware Config

Extracted

Family

vidar

Version

6.2

Botnet

58f391d2f33b9f5a2ddb51a3516986eb

C2

https://steamcommunity.com/profiles/76561199564671869

https://t.me/scubytale

Attributes
  • profile_id_v2

    58f391d2f33b9f5a2ddb51a3516986eb

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 OPR/104.0.0.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2372-142-0x0000000000400000-0x0000000000462000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections