General

  • Target

    1520-56-0x0000000000400000-0x00000000004A9000-memory.dmp

  • Size

    676KB

  • MD5

    62bf7bdb898ed66aa91793d7d664c807

  • SHA1

    7606ee9fed151c0ff69f9d099fbe5b1b5226a467

  • SHA256

    7b37d188d72273fc3121a5235d56f1f1bb9982933ccb193ff58e4a13c16705b7

  • SHA512

    018c88b25c2fb2050481137189871c80822790748ca7dc0283864d15916c03be0266e77c4a70880a0dd23ce041c7c13988989bb7a371f6f40c82889f468b54a2

  • SSDEEP

    12288:1sWKa915bnIR7FBGJAY6Idigta96lW3tH/+e:OWKa915bnIR7TGJ0Idig86k3tH/7

Score
10/10

Malware Config

Extracted

Family

vidar

Version

52.2

Botnet

1163

C2

https://t.me/netflixaccsfree

https://mastodon.social/@ronxik12

Attributes
  • profile_id

    1163

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 1520-56-0x0000000000400000-0x00000000004A9000-memory.dmp
    .exe windows x86


    Headers

    Sections