General

  • Target

    2020-81-0x0000000000400000-0x0000000000648000-memory.dmp

  • Size

    2.3MB

  • MD5

    a0508b9d13473898c18eb42dcfe7dc65

  • SHA1

    fab7d1b07c367b2d7aada59a087e43889962eca1

  • SHA256

    f650905770c27d8f858f0447782d368e1650d1cbeec62a8d3a7ebc47e37b6751

  • SHA512

    f44b09d182e85e3805f498a02e3d726b21998b96e51dc85492eb27b897fa3af27780aaef0bc0b4f8db0d3e3a025177cb98f4d590a4a2bf546357e33ea1b5819e

  • SSDEEP

    3072:lTQm3axZbvWtCyEwVt2IUE5iujhGzCLEoSreNsagz6p9ufjol:2mqHbv+EwiIf5ykEoSlMufj

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://t.me/bu77un

https://steamcommunity.com/profiles/76561199730044335

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.1) Gecko/20100101 Firefox/128.1

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Stealc family
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2020-81-0x0000000000400000-0x0000000000648000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections