General

  • Target

    912-132-0x0000000000400000-0x0000000000A8F000-memory.dmp

  • Size

    6.6MB

  • MD5

    5d91fdb3a4283c20cf3312fcde36d671

  • SHA1

    784e0246567eee72132c00552b9e772a1cda4425

  • SHA256

    6baa4dca97d1fff60483527a7b4a18247c358f4b600b2c76e62d21c55d39c302

  • SHA512

    abb6ca7877310978932e23bbe08b0b1b3f73097c859563d5fb427cdb02b16f5f0931697f8bc983f0d0218f6d3996ba698ac6b5802d9a2766f2b42b5b94e1598c

  • SSDEEP

    6144:dZgUk6MJuUVT29705Km5dDvsrokCKISjpT:sUk6uQ705Km5drQok6SjpT

Score
10/10

Malware Config

Extracted

Family

vidar

Version

53.1

Botnet

1448

C2

https://t.me/tg_dailyrunnings

https://mastodon.online/@olegf9844g

Attributes
  • profile_id

    1448

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 912-132-0x0000000000400000-0x0000000000A8F000-memory.dmp
    .exe windows x86


    Headers

    Sections