General

  • Target

    1684-3-0x0000000000400000-0x000000000063D000-memory.dmp

  • Size

    2.2MB

  • MD5

    f24f184c66a833a5f830756c23fa1220

  • SHA1

    3d0e09b0c8117951ab1d21148432df2bd5438b5a

  • SHA256

    e3c797cb400937f65255ce7736faf39c3a99249105a838a7dcdb2f7869d60c43

  • SHA512

    6638c35ddb4cae751c062c9db74378cfa39e4dd9c44da7c235c7a0a32b8f279b975f0e9eea56fb66e189a3e9c76ff3616c4e698dd1631fdd4867690432e8ed0a

  • SSDEEP

    3072:8Iuc1RxZ2t9FQnqnUMU+ncuytS+rdUtTnasIR2Mkh3:83c1Fq8qnKDFZk2XRRkh

Malware Config

Extracted

Family

vidar

Version

7.2

Botnet

78e60e5ff5346403300cc9679bfcd088

C2

https://steamcommunity.com/profiles/76561199592921038

https://t.me/mcfuture

Attributes
  • profile_id_v2

    78e60e5ff5346403300cc9679bfcd088

  • user_agent

    Opera/9.80 (X11; Linux i686; U; Debian; pl) Presto/2.2.15 Version/10.00

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1684-3-0x0000000000400000-0x000000000063D000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections