General

  • Target

    2844-173-0x0000000003320000-0x0000000003561000-memory.dmp

  • Size

    2.3MB

  • Sample

    241102-rknn4awhlj

  • MD5

    fc8975e4c15cc0fd001f9cfea71fd497

  • SHA1

    c6b522f0f745141c5e235ec7e7291e0abf0cb56d

  • SHA256

    780703c2fcfbaed2b8a285d899ceb4db3342125242bf3ab5b968d5a1310ea590

  • SHA512

    8067d6adf3abbb2a5169e51bf5b3f87dc975a1dd35c78cc59ac8f45b01f40fec6c1459d012ac183c9503e7478e7ac3cd2f240c8e61a62c418f1e1f7c933bd817

  • SSDEEP

    6144:Vub9iKk3lNqDI4HHswJYdUFiu/IVkp2FkhinkFKBJ+FZ0SQPoCNAuVQu0GM6FAPX:V0iKkjqtHM+iuwVRFnwhCwuO

Malware Config

Extracted

Family

vidar

Version

10.8

Botnet

057d037117dc13a05f53caea44d69e65

C2

https://steamcommunity.com/profiles/76561199761128941

https://t.me/iyigunl

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36

Targets

    • Target

      2844-173-0x0000000003320000-0x0000000003561000-memory.dmp

    • Size

      2.3MB

    • MD5

      fc8975e4c15cc0fd001f9cfea71fd497

    • SHA1

      c6b522f0f745141c5e235ec7e7291e0abf0cb56d

    • SHA256

      780703c2fcfbaed2b8a285d899ceb4db3342125242bf3ab5b968d5a1310ea590

    • SHA512

      8067d6adf3abbb2a5169e51bf5b3f87dc975a1dd35c78cc59ac8f45b01f40fec6c1459d012ac183c9503e7478e7ac3cd2f240c8e61a62c418f1e1f7c933bd817

    • SSDEEP

      6144:Vub9iKk3lNqDI4HHswJYdUFiu/IVkp2FkhinkFKBJ+FZ0SQPoCNAuVQu0GM6FAPX:V0iKkjqtHM+iuwVRFnwhCwuO

    Score
    1/10

MITRE ATT&CK Matrix

Tasks