General

  • Target

    1720-81-0x0000000000400000-0x000000000063F000-memory.dmp

  • Size

    1.2MB

  • MD5

    99fa21ee4d0f52503d1f0a5cd808e985

  • SHA1

    ed4dfa8f8bf47ebe5d074a1438607f0bdd70385d

  • SHA256

    8e1926f6722a3dfe69bc80956a9b2e07e4a5f3580f72f0af558009b164e9924f

  • SHA512

    7a3a76c5940cc3da6c0f3ed49a3566247ce923b36d37af3ed842d421262546ff2ad3f6356cfaef693c875640bc304448e591695e822bf809bd021fedc2d53d21

  • SSDEEP

    3072:LBT41Z2zPc1EKs9miD6tnECzZdO1UILOVjl4Jh:LBT41Z2zPEEKs9mu6tnEyO1zLOVyj

Malware Config

Extracted

Family

vidar

Version

7.5

Botnet

e7447dc405edc4690f5920bdb056364f

C2

https://t.me/bogotatg

https://steamcommunity.com/profiles/76561199621829149

Attributes
  • profile_id_v2

    e7447dc405edc4690f5920bdb056364f

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 11_3) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1720-81-0x0000000000400000-0x000000000063F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections