General

  • Target

    852-178-0x0000000000400000-0x0000000002BD7000-memory.dmp

  • Size

    39.8MB

  • MD5

    6279b28acc4412e116ef4ea35fee498f

  • SHA1

    99e1f2de569eb9e6c9f6a1999a5a59993e842736

  • SHA256

    2e3af04dc24699991971d77396286097efe746631744d0566d7cb7c375a65298

  • SHA512

    40f9e05318d67e6195a591af9e65cb120e605522a5199aec8b7d918524932f85b79135dffe7237d40b0144e20a20afb905405abfb5da0098d599c8ab7c2fcecd

  • SSDEEP

    24576:GPhjj9qhlkNkpOonmG/AnVj5Fkm54my8Lz:KpqhlkNkRmGIVj5uQ4ml3

Score
10/10

Malware Config

Extracted

Family

vidar

Version

39.7

Botnet

933

C2

https://shpak125.tumblr.com/

Attributes
  • profile_id

    933

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 852-178-0x0000000000400000-0x0000000002BD7000-memory.dmp
    .exe windows x86


    Headers

    Sections