General

  • Target

    4968-300-0x0000000000400000-0x00000000006DD000-memory.dmp

  • Size

    2.9MB

  • MD5

    68f9244807c5be20f79835c6ddcc545a

  • SHA1

    918ab4c72a059a97a7ff07e0ca037d053b78a936

  • SHA256

    753a808f9660b4abe50af65037b5f637b0783992e42a1dfa1187dc6df4645b0a

  • SHA512

    25238e6347079606dd72cb5b9459c998179b581ef329debac14e19bc7199c8cebe4568984e083e1fc447748d99a4cf2bfda7a3d3015442ab67348c5eb2d9a72a

  • SSDEEP

    6144:7ua5z4XeLqMVc2Uc1ax/QfTyuAlHKdlJv0KQah6wu2AiKMvF9pCY7MZ:7V5z4XPMPA/QryvodlJv0KQTOF9XY

Malware Config

Extracted

Family

vidar

Version

3.8

Botnet

e5d7cb6205191dc1a4f6288000860943

C2

https://steamcommunity.com/profiles/76561198272578552

https://t.me/libpcre

Attributes
  • profile_id_v2

    e5d7cb6205191dc1a4f6288000860943

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4968-300-0x0000000000400000-0x00000000006DD000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections