General

  • Target

    1776-337-0x0000000000400000-0x0000000000476000-memory.dmp

  • Size

    472KB

  • MD5

    db1a74b1e7e61e8a9f318f9b6f8e286c

  • SHA1

    54f0cf02bcf9d1c7c226f0da78c33af67bf4ca7d

  • SHA256

    54c0a09ce4f666e388dc0519f5eaadbb9f4ece0936f4aaefb64569c08cb60c57

  • SHA512

    b503a1a3463a99682c0cbd3e078c97b08dfa4b31c47fd8f55d35e02428d79a95a0fbb04d6cd00fd98f9e30df644d81a374fad81ac01d6f74a1273440336026e1

  • SSDEEP

    6144:nCyiXVZhMMOP/AXh/PP6IEWEonebA8mUG05UJKH2khp9j5kz+i9moRQ1Jg4EahrN:ndiXZMbKCxWIW+kmoRQ124EyiP/In

Malware Config

Extracted

Family

vidar

Version

4.5

Botnet

75b38583a079a9212c1fa894fd1b945f

C2

https://steamcommunity.com/profiles/76561199520592470

https://t.me/motafan

Attributes
  • profile_id_v2

    75b38583a079a9212c1fa894fd1b945f

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:109.0) Gecko/20100101 Firefox/111.0

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1776-337-0x0000000000400000-0x0000000000476000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections