General

  • Target

    2776-232-0x0000000000400000-0x000000000081B000-memory.dmp

  • Size

    4.1MB

  • MD5

    12fca456c6adb4cd3260ea47bf930bc7

  • SHA1

    c6358d9bea191f660ab4b1c8b23e077da5461bcf

  • SHA256

    c2bb26fd074fab3a4ce989247c986678b9b4e900d5c8ff6a6b1229c1e41610ed

  • SHA512

    91ae32dff57efacb62b9e5ad8f9a323e59d51ea4178f54ef00192a1847a49a98e26e0fecba09ffc71d26747667c08765e6148f3a9b3a85399c8f24d0096d7da1

  • SSDEEP

    6144:CDZmBlZ87p0vRhZ/u8AfjVO0M9qm9Y3TjOYRLXhMNWEMkZwe4:CDZmBi0BA7g0Wqm9wjOYRLatMkZt4

Malware Config

Extracted

Family

vidar

Version

3.4

Botnet

e749025c61b2caca10aa829a9e1a65a1

C2

https://steamcommunity.com/profiles/76561199494593681

https://t.me/auftriebs

Attributes
  • profile_id_v2

    e749025c61b2caca10aa829a9e1a65a1

  • user_agent

    Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2776-232-0x0000000000400000-0x000000000081B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections