General

  • Target

    2192-0-0x0000000000980000-0x0000000001047000-memory.dmp

  • Size

    6.8MB

  • MD5

    63cccf569a7cb71ab083fbfd40fb5577

  • SHA1

    c0f776d5659604833facb8b1f876fc517589bbd2

  • SHA256

    b98d5c238c4241f2e893fa6d91dee27d830fe271cef415f55d536db8ea9829f4

  • SHA512

    5d382a021291108ec80331d5c2d8056dc393936ba4442284f1e7a6160700552c8929751d3de448234c75531e2d9090b0f0d79fcb90127670194c264ef75d7c71

  • SSDEEP

    98304:nCz11w2qfGxwpp1PMh92D2m8lOLzubifTq:m1wGW1PMhHm8YLJT

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

Version

10

Botnet

6d71b3eaa9eb039ff9101688321d6008

C2

https://t.me/r8z0l

https://steamcommunity.com/profiles/76561199698764354

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Stealc family
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2192-0-0x0000000000980000-0x0000000001047000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections