General

  • Target

    1212-61-0x0000000000EA0000-0x000000000171A000-memory.dmp

  • Size

    8.5MB

  • Sample

    220610-kdwykadeh5

  • MD5

    fe3265497408cfccefc766ffb57aeedc

  • SHA1

    1333bc987968634fe8ba966e40e42df5b09c515a

  • SHA256

    1bb6615769ba9987283f18c4153d8906ba1cb5b3e688d7cf74fb5c0893b7d442

  • SHA512

    3b91562b0e36db738b9e49c78450555ddc0308884d5a02417f16fe3e71f524a746abac795f212d82d9eb2d20216ee54510c14fa39e4c78d81d784ce6dca47545

Score
10/10

Malware Config

Extracted

Family

vidar

Version

52.5

Botnet

1325

C2

https://t.me/tg_randomacc

https://indieweb.social/@ronxik333

Attributes
  • profile_id

    1325

Targets

    • Target

      1212-61-0x0000000000EA0000-0x000000000171A000-memory.dmp

    • Size

      8.5MB

    • MD5

      fe3265497408cfccefc766ffb57aeedc

    • SHA1

      1333bc987968634fe8ba966e40e42df5b09c515a

    • SHA256

      1bb6615769ba9987283f18c4153d8906ba1cb5b3e688d7cf74fb5c0893b7d442

    • SHA512

      3b91562b0e36db738b9e49c78450555ddc0308884d5a02417f16fe3e71f524a746abac795f212d82d9eb2d20216ee54510c14fa39e4c78d81d784ce6dca47545

    Score
    3/10

MITRE ATT&CK Matrix

Tasks