General

  • Target

    984-258-0x0000000000400000-0x0000000000644000-memory.dmp

  • Size

    2.3MB

  • MD5

    c81de9785c17347cdd71cd6c1bea5e9a

  • SHA1

    e12ae028c45b8805f3b7ba0bafa361955f2c5e5f

  • SHA256

    cfa0d2c9eb0a4f7f87726ff4df3a5e59bb8f248b00b29e86861e731dd211d2e2

  • SHA512

    27ac9810ff25fceec73285f8afef5d29f9a7445a6be69ff5759e38f21fd6acb9c245adf53ebc61528e8227b66ab143b0409781a4fc55d19d3fb8cf92dcc2eee0

  • SSDEEP

    3072:YT0lBf+dJOee37H9hNWJqd4BcmtbxF6epuO64/N5S:YyB2rOh7HDcbPxX6n2/N5S

Malware Config

Extracted

Family

vidar

Version

8.3

Botnet

82df9629d6ef6fc7fe54d6eb2bc6137b

C2

https://steamcommunity.com/profiles/76561199651834633

https://t.me/raf6ik

Attributes
  • profile_id_v2

    82df9629d6ef6fc7fe54d6eb2bc6137b

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 984-258-0x0000000000400000-0x0000000000644000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections