General

  • Target

    1688-56-0x0000000000400000-0x000000000046C000-memory.dmp

  • Size

    432KB

  • MD5

    bde503183483374106466b488e93556e

  • SHA1

    1762b9794206ab4778b85f6371498da1c9faffb2

  • SHA256

    32a93a0ef49c7f945212d0a515f215ca4d40d31a040513bd5a32fa478e65ff61

  • SHA512

    c1bc050d774ded86b6f1bbc4f90e8507623b846fcce82f450f09e9b624137755ad6461448bcec2d0d8e661ba802930d432e43ef96b9a24ebe82045dd041ced8b

  • SSDEEP

    6144:166+X5aG78XAIn2RN2iy3g8UpioUb65qJfbri5bMuCV4aESqdBFJVjShVH:16HX5aG782ook65G/id5CV5EvZVj

Malware Config

Extracted

Family

vidar

Version

3.5

Botnet

2234cb18bdcd93ea6f4e5f1473025a81

C2

https://steamcommunity.com/profiles/76561199497218285

https://t.me/tg_duckworld

Attributes
  • profile_id_v2

    2234cb18bdcd93ea6f4e5f1473025a81

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1688-56-0x0000000000400000-0x000000000046C000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections