General

  • Target

    2224-2-0x0000000000400000-0x00000000018D1000-memory.dmp

  • Size

    20.8MB

  • MD5

    3fc3bcc05f0730645b97027a87d513d1

  • SHA1

    3d050442a2bd23d260bc3b4c45f32f536b46046f

  • SHA256

    113ff0ef8cb4677fab4cddeab0f009def4c95e90e34c3d87b85070aee4137cf7

  • SHA512

    2bbde0ac1b8c7383efbdc7aef1aaa4444527ad1288907d7d7f417f13c9d75ed688508523d5b68081b77b39a731d4ea442066d9d580e4fbdf2f8059454723b02e

  • SSDEEP

    6144:S2+XqGAdyvA944aSL0g7SLjxhDOfeNROhxkO6J5DUUuoAoA:S2+XqUvA92/gGLjzDqeNROhn6T3

Malware Config

Extracted

Family

vidar

Version

5.2

Botnet

dadaa6490a83a75e47e002e71ee4eabc

C2

https://t.me/odyssey_tg

https://steamcommunity.com/profiles/76561199541261200

Attributes
  • profile_id_v2

    dadaa6490a83a75e47e002e71ee4eabc

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.30 (KHTML, like Gecko) Chrome/115.0.1.0 Safari/537.30

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2224-2-0x0000000000400000-0x00000000018D1000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections