General

  • Target

    520-173-0x0000000000400000-0x0000000002C16000-memory.dmp

  • Size

    40.1MB

  • MD5

    5e21c7e06de7c2dc242323f9158031b8

  • SHA1

    6f2ed13e64f6170a99c202de7ce07252c15ff3ae

  • SHA256

    cdb701e25d8a72bfd588cc5ceaa054fe125293b20f53bdc95107ea9e94f8cb83

  • SHA512

    141e858b2b820281430ef9b3b45504a40d14a2f5ed06c303294537cb455d26d3801da35c3f015e37baf12498775704fa53ba415428f3c2cbf09328087ec7dd5d

  • SSDEEP

    24576:KQKM7dCesGGi5AifQUAb1WSB4BgVZSDvg:0ike9AifYhV4uVZivg

Score
10/10

Malware Config

Extracted

Family

vidar

Version

41.6

Botnet

937

C2

https://mas.to/@lilocc

Attributes
  • profile_id

    937

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 520-173-0x0000000000400000-0x0000000002C16000-memory.dmp
    .exe windows x86


    Headers

    Sections