General

  • Target

    768-311-0x0000000000400000-0x0000000000471000-memory.dmp

  • Size

    452KB

  • MD5

    8364defe53c229ac94d93be670e8fbce

  • SHA1

    15602902a6f98777c23d4d926caa9c2ceddbc99c

  • SHA256

    18cfa82b5e17a263bbc3105ff40977635fb3722bc1adddd4f5018f5d4ce63aa6

  • SHA512

    153956efdcfacb2ef553d8f477cdb545cade2f703c294b7478a3de2b6a1d23b970ab05d13b4d5ac561a225c24515e633c8f2c471c0cbf358e15f6e3d2cc1735b

  • SSDEEP

    6144:xpw8kWACDU/STv8wZlUci6JsjBz+SfnNktnUTU1n8fslW:Tw8klCOSXlN0Fz+SfN2Kun80lW

Malware Config

Extracted

Family

vidar

Version

3

Botnet

d6ef050131e7d5a1d595c51613328971

C2

https://t.me/zaskullz

https://steamcommunity.com/profiles/76561199486572327

http://135.181.87.234:80

Attributes
  • profile_id_v2

    d6ef050131e7d5a1d595c51613328971

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 768-311-0x0000000000400000-0x0000000000471000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections