General

  • Target

    596-176-0x0000000000400000-0x0000000000A0C000-memory.dmp

  • Size

    6.0MB

  • MD5

    ab817353f4af360b081d32822f33c0c0

  • SHA1

    9fcea77585339439f6fb30e652afbb91d5f2211e

  • SHA256

    89a7db602378533de827e0291825f311d8a6f07c5409e83f5d163b0e881ab0b8

  • SHA512

    b6a7564cf68d54da4e960bbfb30dc868adc40cfdfed5e5eb32b1e3032e908a8e07b4b7e84a78bc9800dfee0b80a7d225431fa8987a71158d3f0cda987ecb0082

  • SSDEEP

    24576:+P3z69a/Tcq76tndAOvBDXrBVw5qIBVEzt:YEa/Tcq7EOOZLrB5eVst

Score
10/10

Malware Config

Extracted

Family

vidar

Version

39.6

Botnet

933

C2

https://sslamlssa1.tumblr.com/

Attributes
  • profile_id

    933

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 596-176-0x0000000000400000-0x0000000000A0C000-memory.dmp
    .exe windows x86


    Code Sign

    Headers

    Sections