General

  • Target

    3708-281-0x0000000000400000-0x0000000002C15000-memory.dmp

  • Size

    40.1MB

  • MD5

    85458bd85e5b519a1f986078d2037fa4

  • SHA1

    e63f1991ced26362f456ce8f3dbf6a09524b189f

  • SHA256

    31d5b1d714944ac9a285294ac084921f6e9eb74bf0b479dc61fc016c80df34fb

  • SHA512

    0eb857a24888031b0ec882a392ad5b1152e8c76f8660aa2e4ad0893961cfbc6aa713dd48722b34c7b2fbc41f92f34ba8cf9255cfb22138695b5434e93c5691f4

  • SSDEEP

    24576:XQKM7dCesGGi5AifQUAb1WSB4BgDZWDvK:vike9AifYhV4uDZuvK

Score
10/10

Malware Config

Extracted

Family

vidar

Version

41.6

Botnet

933

C2

https://mas.to/@lilocc

Attributes
  • profile_id

    933

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 3708-281-0x0000000000400000-0x0000000002C15000-memory.dmp
    .exe windows x86


    Headers

    Sections