General

  • Target

    a340452a85bbb4e0946b766a64b72e0727e6469ef45c07ddc697effa2979604a

  • Size

    366KB

  • MD5

    6543715c2fec099bc99b96e8ec935b34

  • SHA1

    9f5eca98260a9d499dabc75a04ce41e0dae888fb

  • SHA256

    a340452a85bbb4e0946b766a64b72e0727e6469ef45c07ddc697effa2979604a

  • SHA512

    661e20a35016f25b0f6aaae6dd3597ae0365e06bf47936052e90692f16e52e8afa9aa812aabf43ebdd03426989243117f08aaf11dafe498a85352afecc18d129

  • SSDEEP

    6144:9NvC1zqSQz/E+KM9Lys1WIQuWyV3EszeC+SktSpUEqIbyCg:9NvC1zqjETs1z/hVBzeC+SkI6Ibyr

Malware Config

Extracted

Family

vidar

Version

5.4

Botnet

9c9fae8d3c76dfb8bc94a559121bbd66

C2

https://t.me/vogogor

https://steamcommunity.com/profiles/76561199545993403

Attributes
  • profile_id_v2

    9c9fae8d3c76dfb8bc94a559121bbd66

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.2.13 (KHTML, like Gecko) Version/16.5.2 Safari/605.2.13

Signatures

  • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a340452a85bbb4e0946b766a64b72e0727e6469ef45c07ddc697effa2979604a
    .exe windows:5 windows x86 arch:x86

    81338ab77edea5e055e5edd9d10bfcae


    Headers

    Imports

    Sections