General

  • Target

    6036-345-0x0000000000400000-0x00000000004F8000-memory.dmp

  • Size

    992KB

  • MD5

    61c3312cc4d64726a409c3f5b297bc23

  • SHA1

    8c0f5579133a6ff1abdd72cbd7119f1fb2f3ee1a

  • SHA256

    db21b301bbff1195e8059ecff274cd832fe47dd1ba4cb3416b884d67811320d8

  • SHA512

    f483d18410afbfb7e843fbb76342c05f9ffe1d31c3603a53076447f6284270f71baf85af6146b0080fdd3e5e765073839cf1587570618e6fb4feadd4bc24247a

  • SSDEEP

    12288:xsenlkXFuhXfSIFlMLa/xe/BulW3vf/C0:aelkXMhXfSIF2Loe/Buk/fq0

Score
10/10

Malware Config

Extracted

Family

vidar

Version

52

Botnet

937

C2

https://t.me/hollandracing

https://busshi.moe/@ronxik321

Attributes
  • profile_id

    937

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 6036-345-0x0000000000400000-0x00000000004F8000-memory.dmp
    .exe windows x86


    Headers

    Sections