General

  • Target

    1684-3-0x0000000000400000-0x000000000063D000-memory.dmp

  • Size

    2.2MB

  • Sample

    240526-ltjtlseb6w

  • MD5

    f24f184c66a833a5f830756c23fa1220

  • SHA1

    3d0e09b0c8117951ab1d21148432df2bd5438b5a

  • SHA256

    e3c797cb400937f65255ce7736faf39c3a99249105a838a7dcdb2f7869d60c43

  • SHA512

    6638c35ddb4cae751c062c9db74378cfa39e4dd9c44da7c235c7a0a32b8f279b975f0e9eea56fb66e189a3e9c76ff3616c4e698dd1631fdd4867690432e8ed0a

  • SSDEEP

    3072:8Iuc1RxZ2t9FQnqnUMU+ncuytS+rdUtTnasIR2Mkh3:83c1Fq8qnKDFZk2XRRkh

Malware Config

Extracted

Family

vidar

Version

7.2

Botnet

78e60e5ff5346403300cc9679bfcd088

C2

https://steamcommunity.com/profiles/76561199592921038

https://t.me/mcfuture

Attributes
  • profile_id_v2

    78e60e5ff5346403300cc9679bfcd088

  • user_agent

    Opera/9.80 (X11; Linux i686; U; Debian; pl) Presto/2.2.15 Version/10.00

Targets

    • Target

      1684-3-0x0000000000400000-0x000000000063D000-memory.dmp

    • Size

      2.2MB

    • MD5

      f24f184c66a833a5f830756c23fa1220

    • SHA1

      3d0e09b0c8117951ab1d21148432df2bd5438b5a

    • SHA256

      e3c797cb400937f65255ce7736faf39c3a99249105a838a7dcdb2f7869d60c43

    • SHA512

      6638c35ddb4cae751c062c9db74378cfa39e4dd9c44da7c235c7a0a32b8f279b975f0e9eea56fb66e189a3e9c76ff3616c4e698dd1631fdd4867690432e8ed0a

    • SSDEEP

      3072:8Iuc1RxZ2t9FQnqnUMU+ncuytS+rdUtTnasIR2Mkh3:83c1Fq8qnKDFZk2XRRkh

    Score
    1/10

MITRE ATT&CK Matrix

Tasks