General

  • Target

    1536-434-0x0000000000400000-0x0000000000476000-memory.dmp

  • Size

    472KB

  • MD5

    47d99ef8084dd6928a3c06758d4d0efa

  • SHA1

    cb8bc0e7c4184b492aad06215252d1de514c6344

  • SHA256

    1db82eac7e519d4513a88dee17ba8886d2ee394565f2d03442d549150b47a0e5

  • SHA512

    a9ba21f103405a9fab4292c626b8ee6f59ab8d0425cdd3d92e640c812e09a4092ee8c4082de12c3b3431a5e675b39c55138b29747bd7febe746b60df9e5f589b

  • SSDEEP

    6144:nCyiXVZhMMOP/AXh/PP6IEWEonebA8mUG05UJKH2khp9j5kz+i9moRQ1Jg4EahrV:ndiXZMbKCxWIW+kmoRQ124EyiPrIn

Malware Config

Extracted

Family

vidar

Version

4.5

Botnet

75b38583a079a9212c1fa894fd1b945f

C2

https://steamcommunity.com/profiles/76561199520592470

https://t.me/motafan

Attributes
  • profile_id_v2

    75b38583a079a9212c1fa894fd1b945f

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/111.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1536-434-0x0000000000400000-0x0000000000476000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections