General

  • Target

    108-58-0x0000000000400000-0x0000000000493000-memory.dmp

  • Size

    588KB

  • MD5

    0cffa2c01bb676854c532a60016bdc1e

  • SHA1

    90283ddd7a9c65ebe27a62c735dd56c0fa7390d7

  • SHA256

    15b7893be2d78dfc453758da3c3d4aca9af22314c30b9baa1999d81dd12a8c9b

  • SHA512

    9493c2010693272f77a51933e892e192dd519803b141afb497429ec7b033984dd5e787eadf8932e4e1bd2591525d7c9ce29b39d739408cca651b52fd92c25f88

  • SSDEEP

    12288:O6HX5aG782ook65G/id5CV5evZVNwaR/XjBzdhyGcZ:O6HJdVook6E/8kiVzhTT/c

Malware Config

Extracted

Family

vidar

Version

3.5

Botnet

d8e152358cfa1281bbf6acbfda2ced42

C2

https://steamcommunity.com/profiles/76561199497218285

https://t.me/tg_duckworld

Attributes
  • profile_id_v2

    d8e152358cfa1281bbf6acbfda2ced42

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 108-58-0x0000000000400000-0x0000000000493000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections