General

  • Target

    1968-103-0x0000000000400000-0x00000000006C7000-memory.dmp

  • Size

    2.8MB

  • MD5

    df955f9663ef91b8b0cb5eee917aac8b

  • SHA1

    cfb9d5f72a348403d68d486bea64b8a294c2c6a8

  • SHA256

    228987fd4b025a11fcdab9b20cdb5e819db333ba1c8eef1817b66cea2eb2722c

  • SHA512

    aa6009ab99ce87929ebaef292d2b7d3596f787e0f12ed9e9f57934c53754a18fa233ac36cf63b2abb2672529e656ab709913b8844770f99306973f37c3eb2187

  • SSDEEP

    6144:uCyiXVZhMMOP/AXh/PP6IEWEonebA8mUG05UJKH2khp9j5kz+i9moRQmJg7Eahrj:udiXZMbKCxWIW+kmoRQm27EyiPJInD

Malware Config

Extracted

Family

vidar

Version

4.5

Botnet

12403f3562ffd49d3a3d2ce5d201f221

C2

https://steamcommunity.com/profiles/76561199520592470

https://t.me/motafan

Attributes
  • profile_id_v2

    12403f3562ffd49d3a3d2ce5d201f221

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/111.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1968-103-0x0000000000400000-0x00000000006C7000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections