General

  • Target

    1980-90-0x0000000000400000-0x0000000000676000-memory.dmp

  • Size

    2.5MB

  • MD5

    4dad3a3ab0d6d93b5c33119fa3edbf5f

  • SHA1

    3727be8904cb43e91eae9393d6fa0d01a6c9c11a

  • SHA256

    d1e57f0ee9926277425880cc99dfe92c63cfc0db497a53f0e74f0559603bb22a

  • SHA512

    0bdf65899c6cf4f39bd436fd471e9f69c28306ac0e0d85028a3b01c4011deec32e105e5db78fd3aeb9e1e4d181a432ca94edeaabcbef3e8ffa95039b47ea03de

  • SSDEEP

    6144:Z4E5LXJWKkpvmmpqCDB8ZvR0Vbux0R4kF/Y/o8+6y:Z4qJkp+3CDiZJ0Ix6BY/s6y

Malware Config

Extracted

Family

vidar

Version

11

Botnet

c8450254a9a0920212cb81ae7f386da3

C2

https://t.me/jamsemlg

https://steamcommunity.com/profiles/76561199780418869

https://t.me/ae5ed

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1980-90-0x0000000000400000-0x0000000000676000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections