General

  • Target

    1940-56-0x0000000000400000-0x0000000000453000-memory.dmp

  • Size

    332KB

  • MD5

    c54f848017486122c76efe1871f1f9a8

  • SHA1

    f4b3a2ba20c97a48a9564fd94d9600dc7e08c7d0

  • SHA256

    98ab927748d460d3468f23a062b5d8c4e7a887e72f9a7e6e95c9dce492228249

  • SHA512

    7a59c1880c0e4bf473061f9b722b69991e5484e6221cd4d40248bd68907169062bb5bda3ced830328f5bbc81b1fc83653ae79eebf11643376d50faf855f415d4

  • SSDEEP

    6144:MdUkXLSElGAToy3qpnpg62SRKI/Oa9/YxUdojOKLlNIlW05F38:MvxlG4oy3qpnpQI/Om/YxUdojZNIlW0

Score
10/10

Malware Config

Extracted

Family

vidar

Version

52.3

Botnet

1366

C2

https://t.me/hyipsdigest

https://mastodon.online/@ronxik13

Attributes
  • profile_id

    1366

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 1940-56-0x0000000000400000-0x0000000000453000-memory.dmp
    .exe windows x86


    Headers

    Sections