General

  • Target

    20e92c2bf75c473b745617932f8dc0f8051bfc2f91bb938b2cc1cd808ebbc675

  • Size

    550KB

  • MD5

    5a519c2a100403b31cbfa3a720dda1b8

  • SHA1

    05bfc6b320d9b72e94aaa92279b80fa60b0fc873

  • SHA256

    20e92c2bf75c473b745617932f8dc0f8051bfc2f91bb938b2cc1cd808ebbc675

  • SHA512

    6c5d0e35750a998985652178efaf4dbea4f368132468a432002bed3493403d9d92b0fe37d3d8946dfb68d9452a873fc40cec818a1cce3959fd582ece7bdbaade

  • SSDEEP

    12288:SCTiyOx5dgQJirTGG17qIgGuAR/u4cjUbc8KCR0X3/1:DTiyagxTltgXa246UA8K209

Malware Config

Extracted

Family

vidar

Version

4

Botnet

178

C2

http://bokolavrstos.com/

Attributes
  • profile_id

    178

Signatures

  • Masslogger family
  • Vidar Stealer 1 IoCs
  • Vidar family
  • Vidar log file 1 IoCs

    Detects a log file produced by Vidar.

Files

  • 20e92c2bf75c473b745617932f8dc0f8051bfc2f91bb938b2cc1cd808ebbc675
    .exe windows x86

    98b4cfcd7dfc1cefe6c1cd6068895d2d


    Headers

    Imports

    Sections