General

  • Target

    2068-3-0x0000000000400000-0x0000000001A34000-memory.dmp

  • Size

    22.2MB

  • MD5

    fc837ea4c112c24c90296fd6d213911f

  • SHA1

    f001fb2636e870bc9320080b04e6cc70aa7df6f2

  • SHA256

    be2ac4bed5cbc85bcf96ab16b4fd4476b665f0d560b11cbf87e9702084d88829

  • SHA512

    4573cfd5b9dce40a94a85dfdb87dcfca99dc6f6e0a0fc534e2dab595cef0cadbd4c5f82a8338fd8a11522b3c856a90583e3ac6e8dd262a1f56272817731bbffb

  • SSDEEP

    3072:c7AkGT31oD0yJWwIBuqzIOS8EKtck4I/jnIt9oLG+1vDMc4wV8ERlJ7K34Mb8tBG:c0kKo4yxIoqUOnUk4GIt6D2M6oo

Malware Config

Extracted

Family

vidar

Version

8

Botnet

b8a5ebfe4a0abceff8d2cd1a6c6c4024

C2

https://steamcommunity.com/profiles/76561199644883218

https://t.me/neoschats

Attributes
  • profile_id_v2

    b8a5ebfe4a0abceff8d2cd1a6c6c4024

  • user_agent

    Mozilla/5.0 (Linux; Android 11; M2102J20SG) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.99 Mobile Safari/537.36 EdgA/97.0.1072.78

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2068-3-0x0000000000400000-0x0000000001A34000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections