General

  • Target

    1708-193-0x0000000000400000-0x0000000000A0C000-memory.dmp

  • Size

    6.0MB

  • MD5

    206b344c0c84dd1c8c365ff40f5c80c4

  • SHA1

    17fe75e4626e687f24964d57065abb91b5280030

  • SHA256

    f697d56448f35d2f0204ff470aa94442278fc72cfe384c5052b24dc443373192

  • SHA512

    a8d0f21c1fe2369dfefc5ddce7a7d811e144a12f7d9537bd88ce67938076b44609f6479f674179c94fb7baf803912adf96f3a02e31b56cc0c93ea7ebfdba41a0

  • SSDEEP

    24576:+P3z69a/Tcq76tndAOvBDXrBVi5qIBV0zt:YEa/Tcq7EOOZLrBbeVct

Score
10/10

Malware Config

Extracted

Family

vidar

Version

39.6

Botnet

933

C2

https://sslamlssa1.tumblr.com/

Attributes
  • profile_id

    933

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 1708-193-0x0000000000400000-0x0000000000A0C000-memory.dmp
    .exe windows x86


    Headers

    Sections