General

  • Target

    2328-3-0x0000000000290000-0x000000000104C000-memory.dmp

  • Size

    13.7MB

  • MD5

    cc2472ad47a6d1e47e287359eb85ac19

  • SHA1

    db2d0d1c53c5b19aa6eea70d7854ae09bb5ce105

  • SHA256

    dd1328beaf259b64ae7d4a2c18c9d2561d732b8a9015e0967cdc38c651d32889

  • SHA512

    1b06cfe37071ed283fa08bab08c281ed3f88fc238cc00219c4cbee13ad01758571b56423348b92163c2189aa7cfed4a06e4d44d08fbd4bfba3063e727d326d6a

  • SSDEEP

    196608:8R7Voq+Te2yIhxT/h8PDG3qHYaQaA+pSeZVijoH9egJfjFumVjbRZ8W:8hVV+oIhi8KYJ0x9HjbRZ8W

Malware Config

Extracted

Family

vidar

Version

7.9

Botnet

b04533ad3d11c9398985823d3ccaaa49

C2

https://t.me/hypergog

https://steamcommunity.com/profiles/76561199642171824

Attributes
  • profile_id_v2

    b04533ad3d11c9398985823d3ccaaa49

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2328-3-0x0000000000290000-0x000000000104C000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections