General

  • Target

    2268-0-0x0000000000050000-0x000000000065C000-memory.dmp

  • Size

    6.0MB

  • MD5

    65f72c9df1f1772a553f23cc3200be68

  • SHA1

    f14e7b07d88b9f2e590e47462f10a52399a2a616

  • SHA256

    a0c59cf7565d64a7e2e5fac63a7866020dd8e42286f30e632ee0d7072aa29926

  • SHA512

    c38a5e775ccfdf83171b976287a726c5bf99899701fbecb2504fcce9e4dfdabb690b69617a1b49a6e94a25a1a7c8303fbf2b49480b406eac4e910ca107578da5

  • SSDEEP

    98304:15bRLxjb5sphyGYV9qUHMPoTYQBMh+q3Jh0eUeTCjxrU9VHhO:DjVsT7YVPHPBMQq3z0eUeejxrUXE

Malware Config

Extracted

Family

vidar

Version

3.5

Botnet

9c0eb4143c87bbb1c416f3ead53c41ad

C2

https://steamcommunity.com/profiles/76561199497218285

https://t.me/tg_duckworld

Attributes
  • profile_id_v2

    9c0eb4143c87bbb1c416f3ead53c41ad

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2268-0-0x0000000000050000-0x000000000065C000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections