General

  • Target

    1760-103-0x0000000000400000-0x00000000004E3000-memory.dmp

  • Size

    908KB

  • MD5

    4235b8bb2b2325e814329411f37ac7b8

  • SHA1

    3b1eb90ffce1c6b789bbf55cc14a5f09fe6d8a48

  • SHA256

    c05811dea79b1df024a28a866c23c9c3d2e3a23e17c039a199bd30e0ae90dedc

  • SHA512

    9f074675839bfb7f737701d19c47242a28ca2b77ab521e68860ae9ea9d3590c82e276d29490f52fd5aa95805282742105a470b5b3ba50b42bc0995c7510ed8b2

  • SSDEEP

    6144:ACyiXVZhMMOP/AXh/PP6IEWEonebA8mUG05UJKH2khp9j5kz+i9moRQcJgrEahrU:AdiXZMbKCxWIW+kmoRQc2rEyiPtInQ

Malware Config

Extracted

Family

vidar

Version

4.5

Botnet

e05ec6eedc8e5b4e9a499c750306ff2a

C2

https://steamcommunity.com/profiles/76561199520592470

https://t.me/motafan

Attributes
  • profile_id_v2

    e05ec6eedc8e5b4e9a499c750306ff2a

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/111.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1760-103-0x0000000000400000-0x00000000004E3000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections