General

  • Target

    4820-320-0x0000000000400000-0x00000000006DD000-memory.dmp

  • Size

    2.9MB

  • MD5

    8183f964a96ca7d848783043ae026ed3

  • SHA1

    90d87effead3496a668bb7df0f8320086db391e8

  • SHA256

    185e329b5c3ad82fd985080ea3cc6cbe02ed0e0c0f814929d0bab60a28e44a8e

  • SHA512

    e3f0dad0ccd4abd40f991b42ca5d7a7d685c58c08b9e66790fbd5530a472a5bd66072670b218b6f95672ac737832240b9b86d63c1c1d2d12fcea77c891bc1383

  • SSDEEP

    6144:7ua5z4XeLqMVc2Uc1ax/QfTyuAlHKdlJh0KQah6wu2Ai1SvFvpCY7MZ:7V5z4XPMPA/QryvodlJh0KQTrFvXY

Malware Config

Extracted

Family

vidar

Version

3.8

Botnet

e5d7cb6205191dc1a4f6288000860943

C2

https://steamcommunity.com/profiles/76561198272578552

https://t.me/libpcre

Attributes
  • profile_id_v2

    e5d7cb6205191dc1a4f6288000860943

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4820-320-0x0000000000400000-0x00000000006DD000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections