General
-
Target
1632-91-0x000000000042094D-mapping.dmp
-
Size
642KB
-
MD5
8c6e48bd51ca21913f0bf0598773166b
-
SHA1
d07260f1a01dd51f09d45c8cd6f13d57bad4d64f
-
SHA256
d152d5ec922a9e1d9b5a6e62c76c9e14f81541d46a093df08ecdd40aea0e3c9b
-
SHA512
70eb5da6bd917bd47c4cd53bd1ce745775521a68ba5bece01d1c3efa1b0f2f9db9ebef020bd0e4f139c27970afa80514c162fe7f2ee9302b025046d41007a57a
-
SSDEEP
12288:Oyuuxfl0PumDtiy6uyAyvryuuxfl0PumDtiy6jyAyec:Oyu6fqPumDl6RZryu6fqPumDl6uYc
Malware Config
Extracted
Family
vidar
Version
54.6
Botnet
517
C2
https://t.me/huobiinside
https://mas.to/@kyriazhs1975
Attributes
-
profile_id
517
Signatures
-
Vidar family
Files
-
1632-91-0x000000000042094D-mapping.dmp