General

  • Target

    304-59-0x0000000000400000-0x0000000000453000-memory.dmp

  • Size

    332KB

  • MD5

    873f90ff88c0dd292a7a38582ccd8539

  • SHA1

    99493d989b1632a4e3db1a89dffae104ce5670bf

  • SHA256

    015e1d24439da1e6d42d9a6b01b365b727ec8b6c331f1e296ea9830f9066d7fe

  • SHA512

    55d72299752a60c8b2ca185ebeeeecb2f9c3d665623e33f1b7968afde994fd90d6a295e837c35efb7c6962a73c12081f660013807e198df25d31444a2f2b1e09

  • SSDEEP

    6144:83ShHWKarcaj15bnIRV6C6soWFUOGJAY6Idig3/c0G179flWAo07JH:wsWKa915bnIR7FBGJAY6Idig3a9flWc5

Score
10/10

Malware Config

Extracted

Family

vidar

Version

52.2

Botnet

1182

C2

https://t.me/netflixaccsfree

https://mastodon.social/@ronxik12

Attributes
  • profile_id

    1182

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 304-59-0x0000000000400000-0x0000000000453000-memory.dmp
    .exe windows x86


    Headers

    Sections