General

  • Target

    1092-140-0x0000000000AB0000-0x0000000000D09000-memory.dmp

  • Size

    2.3MB

  • MD5

    000de95803063573cc4282b6aff054cf

  • SHA1

    28ad876506d56b01518ffd9fdc9113caac9ce181

  • SHA256

    00055056e2078b4058be56f71d747fcc71eb05dfc437c4b0a15dce643468d75a

  • SHA512

    e4cd4f83c839e6a4e0521f5bcccacefe1d88f40324fe5baff20385184104dcf7bea6aaba6d46dfe2d84ba8d1f6b8eab5343727d4d5203cc88625905c1c7992c1

  • SSDEEP

    6144:i8B1pQVaHXh1jJx0lWcITteIwZ903bf88U9Rri:i8B1pQV/AAq3bfPU/m

Malware Config

Extracted

Family

vidar

Version

11.8

Botnet

41d35cbb974bc2d1287dcd4381b4a2a8

C2

https://t.me/fu4chmo

https://steamcommunity.com/profiles/76561199802540894

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Stealc family
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1092-140-0x0000000000AB0000-0x0000000000D09000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections