General

  • Target

    2012-56-0x0000000000400000-0x0000000000479000-memory.dmp

  • Size

    484KB

  • MD5

    9e2d4fa0290e71e396227c27386f8afe

  • SHA1

    12217e3a747608c92c271f148d025135cac0878e

  • SHA256

    f330a1fa6437d2c52069b2bb55448cf0d96cca9300ed5ba792cdc37b157cca77

  • SHA512

    41ea684f9551d537ec915e9d377f729ff6f770b654e159c335288e67320d96cd1a98a7aa8eacc9db32e176c3c41dbb1c73bae8a7af598228632741b1c21c0b67

  • SSDEEP

    6144:EbbD2RXh9KD7EvVkr0evEcZ7/CUqjfgQlVumrdVRXL0chXfoJcWS:EbuRX6D7ENiKUqDgYumrLRXL0ZN

Malware Config

Extracted

Family

vidar

Version

3.6

Botnet

78489afd9d9a4747beb445e5fb5b9c96

C2

https://steamcommunity.com/profiles/76561199499188534

https://t.me/nutalse

Attributes
  • profile_id_v2

    78489afd9d9a4747beb445e5fb5b9c96

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2012-56-0x0000000000400000-0x0000000000479000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections