General

  • Target

    2772-1633-0x0000000000010000-0x0000000000269000-memory.dmp

  • Size

    2.3MB

  • MD5

    46d7e1ce93aa61a578b648f7fa1cd5e6

  • SHA1

    7c8f73a89f17604cf96f9e0ffd1dde3edc9cef86

  • SHA256

    0e2d4f17e647115a942ffc2094668f66bc6402d6164f46e300a3f9f076def689

  • SHA512

    ac36bc2356534356e1bd287809591c7c06653662e7d73cba598f51f8d6aa6ccd3e25d163affc4b70189e4861600a6c8f8392b00e8b269e5bbf9675e218bc126b

  • SSDEEP

    6144:3zTewG2FL1oSTpnCpt0eqAhkZygxPi80HPrE:3zTebrVdqM4HxP50vo

Malware Config

Extracted

Family

vidar

Version

11.8

Botnet

93e4f2dec1428009f8bc755e83a21d1b

C2

https://t.me/fu4chmo

https://steamcommunity.com/profiles/76561199802540894

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Stealc family
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2772-1633-0x0000000000010000-0x0000000000269000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections