General

  • Target

    264-109-0x0000000000400000-0x0000000000657000-memory.dmp

  • Size

    2.3MB

  • MD5

    c5acac87a9c3d85a0ee88ad0d5b510c4

  • SHA1

    ee26f7ee56419ed957f4eadde5a036278a5b791d

  • SHA256

    04dc61757e88edc67a1e46f10978cdd013541fc4a3c0a5c2c0822d8109a96da4

  • SHA512

    fb6d8d086ea0b6f46b8dcd873ec730bbc96d0e8f79dbc1330af6974a321b83f9f8f3844fb26ecf68168fa0faa57c836f4cf6c59ec622baeb2a5a0f4d1ac61474

  • SSDEEP

    3072:TR+9MwiQ1/d0kzv4NmVcc18DM74+c9J3pdN3f5Bl5xoaq0jnp8HraGVmQdwuA:TRKMreKkzwNemDM7AD3iI8p7wu

Score
10/10

Malware Config

Extracted

Family

vidar

C2

https://t.me/edm0d

https://steamcommunity.com/profiles/76561199768374681

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 264-109-0x0000000000400000-0x0000000000657000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections