General

  • Target

    2880-346-0x0000000000400000-0x00000000004B4000-memory.dmp

  • Size

    720KB

  • MD5

    d0af90818eb647973aa25571450fffd2

  • SHA1

    b682a2a1ca1f1dd83ae48f6720b00ebd8211cca1

  • SHA256

    7d6e632ada7a1bcc31b33f1b3cb6e6b8c688ba33a4ac1f3a620b2a90659263a4

  • SHA512

    5e8235bcb36d8fe480954f084b29ec40436308edc577882813d0e64e02e5c8f142e935c02a7bd26cf03772188e54750ad70edd198273123ab2330ccca60fffc0

  • SSDEEP

    12288:zhyTurb4C9y7vJSm1t3aJXMOlabM2jObU2SMvPq2n9rBz3mLEPFzXWxVIc6o5:zYTskC9y7BSm1t3aJXMOlabM2CAmvCeE

Malware Config

Extracted

Family

vidar

Version

4.7

Botnet

be68b9b780fca13cac9960158aaff1b9

C2

https://t.me/eagl3z

https://steamcommunity.com/profiles/76561199159550234

Attributes
  • profile_id_v2

    be68b9b780fca13cac9960158aaff1b9

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1788.0 uacq

Signatures

  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2880-346-0x0000000000400000-0x00000000004B4000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections