General

  • Target

    4364-221-0x0000000000400000-0x00000000004A7000-memory.dmp

  • Size

    668KB

  • MD5

    6c2bb4311a2593b52dc8fa51c4968aeb

  • SHA1

    67b487641f125081d06db95d87cdb3e168042cd5

  • SHA256

    03b9b334ff27f450f8e9b156f3693cf8b8e349754271cdceeac22ae9cd2dec8a

  • SHA512

    769090d9c1e87db83e982aba3a98611a4d11caa792c6a226f5196e49ebd1d8a0a37fb0442fb5f76fb59a051e3a9c406ad30f16b49e9e6e9dd8bb6097086b3abd

  • SSDEEP

    12288:nv5utyXyy3q5HZII/Oa/YxU1H8NNlW093+:nv5utyiy3q55pdh1HwNk093+

Score
10/10

Malware Config

Extracted

Family

vidar

Version

52.3

Botnet

937

C2

https://t.me/hyipsdigest

https://mastodon.online/@ronxik13

Attributes
  • profile_id

    937

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 4364-221-0x0000000000400000-0x00000000004A7000-memory.dmp
    .exe windows x86


    Headers

    Sections