General

  • Target

    1708-56-0x0000000000400000-0x0000000002388000-memory.dmp

  • Size

    31.5MB

  • MD5

    591cd5c42b7a6342804e7d080474f615

  • SHA1

    5a9bc9e5854c814b4140127507e7780dfc1ca12a

  • SHA256

    e8b04d1d6cd5dabec199e8ab96d5de55393a08baed7d269bad9d1c6ea33c48c4

  • SHA512

    f8dcd5a61f082b1e7d2a2762b3d5176387d667f3c9fb04fe19258219d4cd88b966a32f91ab988dbf169320954aebb4da34d384e6870aae6085a66ab359f69c26

  • SSDEEP

    6144:uua5z4XeLqMVc2Uc1ax/QfTyuAlHKdlJ50KAah6wu2AiKUkvFquQYI:uV5z4XPMPA/QryvodlJ50KAT+oFqu+

Malware Config

Extracted

Family

vidar

Version

3.8

Botnet

cdb48fb567690db37648afd4e1d83137

C2

https://steamcommunity.com/profiles/76561198272578552

https://t.me/libpcre

Attributes
  • profile_id_v2

    cdb48fb567690db37648afd4e1d83137

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1708-56-0x0000000000400000-0x0000000002388000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections