General

  • Target

    48bc32d62ad31a689fec695777a0589aa1bf47b11736facbca1ab4a36fd01347

  • Size

    213KB

  • MD5

    eebb5ad0c880d132df75ce01560b4c38

  • SHA1

    2ff2dd8b6e446b4777026c475a5261d0a759faae

  • SHA256

    48bc32d62ad31a689fec695777a0589aa1bf47b11736facbca1ab4a36fd01347

  • SHA512

    ba53307f540b619055f14645eb7ca4e3cce043729a7b221bd15977b1488f6a5fa54b6cc6281becc56f051d7e7ee6dd06ca5d92ee67725d1b49d11dcf508cdc85

  • SSDEEP

    3072:ypAkGTwpdGyFghGC4oPTdzlt1cSq1hmKDUtc8fTVoLG1+kytpj88ERlJ7K3A+l:yGkVGqghcordxtSXmKDqfTDyjo6Qi

Malware Config

Extracted

Family

vidar

Version

7.9

Botnet

588d8377b56b2a00a0a8a354224b4fbc

C2

https://116.203.3.120

https://t.me/hypergog

https://steamcommunity.com/profiles/76561199642171824

Attributes
  • profile_id_v2

    588d8377b56b2a00a0a8a354224b4fbc

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 48bc32d62ad31a689fec695777a0589aa1bf47b11736facbca1ab4a36fd01347
    .exe windows:5 windows x86 arch:x86

    9f7f0b9085b628f0bac4f05bc2d2bce2


    Headers

    Imports

    Sections