General

  • Target

    2228-203-0x0000000000400000-0x00000000004A9000-memory.dmp

  • Size

    676KB

  • MD5

    c270142d1b2b6de5a5494750006a095a

  • SHA1

    f75224a83c13ff75028516a9e7c198b0ee5abb02

  • SHA256

    59c5a2c5e3a75d255f40ffb79482fe08981f876391f44f7221cd70822ab52f91

  • SHA512

    1e001cebc3d205ca8f8cf7ff625edc9d72e63cb5864ed44c702b8652fa1ebc55acf637fff065a85186cc56436b786c13dfd59e5a3e00e33303916d2816d8d76c

  • SSDEEP

    12288:TDKreh818G4c7+//ggtT3Usxn0Mg0mCcmUwBQyNPKh4h2dTbmYm0uCG:T+reKiG4c7+nggtT3Usxn0Mg0ncqZBKY

Malware Config

Extracted

Family

vidar

Version

4.8

Botnet

f9792fd624adcb7f5dfa41ddbec7f1a3

C2

https://t.me/hwbhjegyuvbgyugge

https://t.me/jhfvykuwgfwekuifwbe

https://t.me/sundayevent

https://steamcommunity.com/profiles/76561198982268531

Attributes
  • profile_id_v2

    f9792fd624adcb7f5dfa41ddbec7f1a3

  • user_agent

    Mozilla/5.0 (X11; Linux 3.5.4-1-ARCH i686; es) KHTML/4.9.1 (like Gecko) Konqueror/4.9

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2228-203-0x0000000000400000-0x00000000004A9000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections