General

  • Target

    908-56-0x0000000000400000-0x000000000081C000-memory.dmp

  • Size

    4.1MB

  • MD5

    8ee44c2f84595b970476f45e23588ea2

  • SHA1

    41dff432a4ee8ea620a4688b89af80e610086541

  • SHA256

    64295d22ebeeaf8b91efed75845ff87f33beef2450cc46ba735b242480d45f0c

  • SHA512

    281169c87c877f539aa270e79c076079a83d7913519050a769ff1c7c212fb690d810b72141086f501242eb85b61ef077a1a6a327201e12fbeb90bc67f78d95ec

  • SSDEEP

    6144:EbbD2RXh9KD7EvVkr0evEcZ7/CUqjfgQlVumrfVRXL0chXfoMcW:EbuRX6D7ENiKUqDgYumr9RXL08N

Malware Config

Extracted

Family

vidar

Version

3.6

Botnet

78489afd9d9a4747beb445e5fb5b9c96

C2

https://steamcommunity.com/profiles/76561199499188534

https://t.me/nutalse

Attributes
  • profile_id_v2

    78489afd9d9a4747beb445e5fb5b9c96

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 908-56-0x0000000000400000-0x000000000081C000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections