General

  • Target

    1312-207-0x0000000000400000-0x000000000094A000-memory.dmp

  • Size

    5.3MB

  • MD5

    0bfe3a4a5387a728f5ca80bb580f7d80

  • SHA1

    ba2c588daa39608a7bb5991e68425f3ed1579c49

  • SHA256

    e46d3e797958e21bfa3bae718a27ec95b53c028255efcc9d5047da78e1a6f3e3

  • SHA512

    29857e9a97ee16da40587b03f0e1011fcc045ffccfc2ea417425fdd88f3d7a3a620882297452d71509fadd69e8c8346da8c96195b721a7b0dedd0f28a98403b2

  • SSDEEP

    24576:lP/k69a/bcq76tndALvBDXrBViIOzRVa:2Ea/bcq7EOLZLrBq9Va

Score
10/10

Malware Config

Extracted

Family

vidar

Version

39.4

Botnet

706

C2

https://sergeevih43.tumblr.com/

Attributes
  • profile_id

    706

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 1312-207-0x0000000000400000-0x000000000094A000-memory.dmp
    .exe windows x86


    Headers

    Sections