General

  • Target

    1476-175-0x0000000003100000-0x0000000003341000-memory.dmp

  • Size

    2.3MB

  • MD5

    29bf7807737bb2e61717f418c30ef0a6

  • SHA1

    4fbce1475a56f4067f2b26c602fd2997df68baeb

  • SHA256

    1d5a2eeec5494a402758f28ccc2ed0299e1a68d1a0e9e024b24357b51ab3924f

  • SHA512

    b6a18db9c6bd2f55fa75ace1fed68be1257dae8e5db231983109d58be993c94064e6ec12fa29f52d298a2044ebdd3f57f6ad8ed0bb839045546620990c2d32b9

  • SSDEEP

    6144:ZHlCbGJTkWmStfEDI4R3+wx2DUFQulWVkpSFkhDpkBjt6v0OFHY7zgElo8od7L3g:ZHT1kW1EtR8AQuoV1F1uXfLUSK

Malware Config

Extracted

Family

vidar

Version

10.8

Botnet

057d037117dc13a05f53caea44d69e65

C2

https://steamcommunity.com/profiles/76561199761128941

https://t.me/iyigunl

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1476-175-0x0000000003100000-0x0000000003341000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections