General

  • Target

    1632-91-0x000000000042094D-mapping.dmp

  • Size

    642KB

  • MD5

    8c6e48bd51ca21913f0bf0598773166b

  • SHA1

    d07260f1a01dd51f09d45c8cd6f13d57bad4d64f

  • SHA256

    d152d5ec922a9e1d9b5a6e62c76c9e14f81541d46a093df08ecdd40aea0e3c9b

  • SHA512

    70eb5da6bd917bd47c4cd53bd1ce745775521a68ba5bece01d1c3efa1b0f2f9db9ebef020bd0e4f139c27970afa80514c162fe7f2ee9302b025046d41007a57a

  • SSDEEP

    12288:Oyuuxfl0PumDtiy6uyAyvryuuxfl0PumDtiy6jyAyec:Oyu6fqPumDl6RZryu6fqPumDl6uYc

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.6

Botnet

517

C2

https://t.me/huobiinside

https://mas.to/@kyriazhs1975

Attributes
  • profile_id

    517

Signatures

Files

  • 1632-91-0x000000000042094D-mapping.dmp