General

  • Target

    1120-72-0x0000000000400000-0x0000000000CBE000-memory.dmp

  • Size

    8.7MB

  • MD5

    2eb98728b359f1dc32895f4452a1cc59

  • SHA1

    0e521683ffc3481b8610921d463aabff8b3bd0d4

  • SHA256

    90732719c342e3118e651ff698263e3dcb382c3c9359fd40512a6a861e33da42

  • SHA512

    2815526666263eda863890c4957904f8399981e70636cb48cbdb2810629ce95cc5233f454bfa359fd6b82dde420a8f7e5c2b37e3cd308280185c784abd438605

  • SSDEEP

    12288:2T3mOqtmV5C6TRTDvOCqhJ8PrZOnLJ0wyxbX3/LEEK64TN:4WOqQHJROzhJorZ8dyxbgEK64TN

Score
10/10

Malware Config

Extracted

Family

vidar

Version

10.3

Botnet

231

C2

http://trasolevelqvines.com/

Attributes
  • profile_id

    231

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 1120-72-0x0000000000400000-0x0000000000CBE000-memory.dmp
    .exe windows x86


    Headers

    Sections