General

  • Target

    3228-134-0x0000000010000000-0x000000001006B000-memory.dmp

  • Size

    428KB

  • MD5

    acc2b8babff6f6f7c3e17e9637ae4b46

  • SHA1

    1a0519bf02908a0d453f1ec32c73321cac153526

  • SHA256

    0d191445e8ffdd5e62568c1d3ee68fd61be9f37c8f56a110f495d75226e3bd1c

  • SHA512

    49f99fd766a1f1e714d6fe4f6331167848e379d270472206a835a97bdef1995d31a340ebb35c15e47fb555b3d7eba88843251b0395a4aff07e1a615f8e1b7f5f

  • SSDEEP

    6144:Jo/d1m+/71Sr2Wn54DbY7ENJUI0ZePjfDklVRXFMthWMVIO:q/dlu4DbyEwLZePjfD6RXFMCMV5

Malware Config

Extracted

Family

vidar

Version

4.5

Botnet

19c538606b75d27e13807e5f5b638b12

C2

https://steamcommunity.com/profiles/76561199520592470

https://t.me/motafan

Attributes
  • profile_id_v2

    19c538606b75d27e13807e5f5b638b12

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/111.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3228-134-0x0000000010000000-0x000000001006B000-memory.dmp
    .dll windows:5 windows x86 arch:x86


    Headers

    Sections