General

  • Target

    2040-117-0x0000000000400000-0x0000000000643000-memory.dmp

  • Size

    2.3MB

  • MD5

    9d92fe72cf4f48d15623e9546e380148

  • SHA1

    4fc4e2db5cb5c968167950cd82e492c88417f32f

  • SHA256

    7209121117ad5d659532ffc66a47e2d3ac7935a3ecd1ba4bb662967b356c8916

  • SHA512

    ea2aaa87a19544b66849b3a59b22caf2236d9c1b645468174d2530040a717481c0453f5aa5356cfe8fdecbf31aa300b9da12bef8eb7ab51510d1ac868c59d9a4

  • SSDEEP

    6144:TsHPY7hsyvEBr3cQEKmnMGb56j6zISI7xU2S:TszysqFnMX6zmS

Malware Config

Extracted

Family

vidar

Version

7.6

Botnet

1b9d7ec5a25ab9d78c31777a0016a097

C2

https://t.me/tvrugrats

https://steamcommunity.com/profiles/76561199627279110

Attributes
  • profile_id_v2

    1b9d7ec5a25ab9d78c31777a0016a097

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2040-117-0x0000000000400000-0x0000000000643000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections