General

  • Target

    3908-259-0x0000000000400000-0x000000000046A000-memory.dmp

  • Size

    424KB

  • MD5

    c24abda262be8e92edc75ab0446e6bdd

  • SHA1

    b10fe1e24ccd1849323e5e544fb4417a64630ff3

  • SHA256

    3a7abfb3ce5a607477e91b57ea0fc93c4b20793eb1c6ac768d824bcc8f62044a

  • SHA512

    3803ed9357eadd296e425bcdbec70bf7865dee9029e62703ef6b2fe2be8bea78f8e881efe41b11ef07adb2e68ae6ab1867086092e22f6a7bc9cb16c3450cece9

  • SSDEEP

    6144:TBA0i2uim7rAPtf9w8zSRWBt9JPpr+hT5WzYIRh6pId7u1:TG0iwj9w8zS4BPJPpr+ZIt0

Malware Config

Extracted

Family

vidar

Version

4.3

Botnet

a129a8292a021d62796bfced1018aa1f

C2

https://steamcommunity.com/profiles/76561199514261168

https://t.me/kamaprimo

Attributes
  • profile_id_v2

    a129a8292a021d62796bfced1018aa1f

  • user_agent

    Mozilla/5.0 (Linux; U; Tizen 2.0; en-us) AppleWebKit/537.1 (KHTML, like Gecko) Mobile TizenBrowser/2.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3908-259-0x0000000000400000-0x000000000046A000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections