General

  • Target

    4468-516-0x0000000000400000-0x0000000000471000-memory.dmp

  • Size

    452KB

  • MD5

    ae43e97dee6646ec2ff25930a60c1354

  • SHA1

    46b732e0f06907400b0c48c34739f79ab85f1df7

  • SHA256

    e735a56eee5a2643ebca124604c83585740a338f8ccd492ea5dab2fea7b2dc2b

  • SHA512

    1284906217b08b2a789979310a8300f80e2bc1bbf44e9e4166b43339f9f852dd68feb4df10ed85b2cb8c9be38d1f72fb8eff64e9ba324f67aaddc469d18bd1f9

  • SSDEEP

    6144:xpw8kWACDU/STv8wZlUci6JsjBz+Sf7NktnUTiBk1fslW:Tw8klCOSXlN0Fz+SfB2Kgk10lW

Malware Config

Extracted

Family

vidar

Version

3

Botnet

d6ef050131e7d5a1d595c51613328971

C2

https://t.me/zaskullz

https://steamcommunity.com/profiles/76561199486572327

http://135.181.87.234:80

Attributes
  • profile_id_v2

    d6ef050131e7d5a1d595c51613328971

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4468-516-0x0000000000400000-0x0000000000471000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections