General

  • Target

    1192-3-0x0000000000400000-0x00000000007D3000-memory.dmp

  • Size

    3.8MB

  • MD5

    97bff1ef7735f07517587e6ea1ebc18a

  • SHA1

    f2036cacb4ab80d36cd179f5c8c0fef4919c6f0f

  • SHA256

    cfe3ff9e64b07c66d084bb5baf12723602bc581c15477aa2f6e8b6047c4924fb

  • SHA512

    44eaa20250033966ad6c6d4c3c68eb5e73fd3dc9fb9db320ab70bafeaacc2b6b6405fa6be7e426d3b1b9782f1659047100ddd9f9cf1b2f45ebbb223180cfa955

  • SSDEEP

    3072:ffysv34+VEjY9c5WuSIfSJKTuz1F/nMR8yPUxcrmnUlnrnTfmJ/qssn8qqVnCpSY:ffyKE89+WyPTuz70R8yTnrj0QhW

Malware Config

Extracted

Family

vidar

Version

6.7

Botnet

52d67d34ad338b1aab9d89c0da5a59b1

C2

https://t.me/s4p0g

https://steamcommunity.com/profiles/76561199575355834

Attributes
  • profile_id_v2

    52d67d34ad338b1aab9d89c0da5a59b1

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1192-3-0x0000000000400000-0x00000000007D3000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections