General

  • Target

    2244-3-0x0000000000400000-0x00000000022E4000-memory.dmp

  • Size

    30.9MB

  • MD5

    577fe92f9ed69c113c81192c63bb9b5e

  • SHA1

    53f6a3a3b12908ac13d1af5a763e54a9fbd30bb6

  • SHA256

    d721d0fe064d2d248c824d7c725de52eb910329c3f7cad8db37994e3392c8c3a

  • SHA512

    57411860dc63a7ef22f5ecdea88fe3a7e7cca76a1995fa9a43e0c87df7d397c9fb9438e3b6b881737b330c50ff312024a9f81f0ab4248240209a42be388f7662

  • SSDEEP

    3072:c7AkGT31oD0yJWwIBuqzIOS8EKtck4I/jnItwoLG+1vDMc4wJ8ERlJ7K34Mb17pb:c0kKo4yxIoqUOnUk4GItND2I6oo1I

Malware Config

Extracted

Family

vidar

Version

8

Botnet

b8a5ebfe4a0abceff8d2cd1a6c6c4024

C2

https://steamcommunity.com/profiles/76561199644883218

https://t.me/neoschats

Attributes
  • profile_id_v2

    b8a5ebfe4a0abceff8d2cd1a6c6c4024

  • user_agent

    Mozilla/5.0 (Linux; Android 11; M2102J20SG) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.99 Mobile Safari/537.36 EdgA/97.0.1072.78

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2244-3-0x0000000000400000-0x00000000022E4000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections