General

  • Target

    a28dd9f9e5e5b9cd4ed4678f272ae95b.exe

  • Size

    301KB

  • MD5

    a28dd9f9e5e5b9cd4ed4678f272ae95b

  • SHA1

    8baf92898954d076879daf50bcd2b895ecd15f83

  • SHA256

    503f345095e5aa479b922a79aa479394a7ecedc9eba9d396a2a82c4649a479d1

  • SHA512

    a20b9661804f8b787434d70c7beccddef9a013bd76cab31f94e7da1162b8ed764e195d626e3ae7522e5f4581c169cd34ae190eb60f2b370859d2994f5ab7e310

  • SSDEEP

    6144:eseUsm5KWQFn3X5KhXfFsVWAylCMiL4t/xedj4OlWzfosa:eseDV3X5KhXfFs0lILa/xel4OlWzgv

Score
10/10

Malware Config

Extracted

Family

vidar

Version

52

Botnet

1332

C2

https://t.me/hollandracing

https://busshi.moe/@ronxik321

Attributes
  • profile_id

    1332

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • a28dd9f9e5e5b9cd4ed4678f272ae95b.exe
    .exe windows x86

    daf766c710ab43c33f43ee5bbe293518


    Headers

    Imports

    Sections