General

  • Target

    5016-228-0x0000000000400000-0x000000000045B000-memory.dmp

  • Size

    364KB

  • MD5

    a4c43d74ab41f2e802d56b236e50ee39

  • SHA1

    77e5699dd6e200992035f12c4563fce68d130531

  • SHA256

    2d187d81d9d6364264d054b9f0ff41d1a13aa5940064dc388501bbe9eb06bc1c

  • SHA512

    d367bdff7ed6211868dd9491b917028ebefcf32f2653c843f3cdf75b2a00bc98166ba2f21aaefcc5ef8d0fb6587629a9b2441f2bce218b6c3924b699eb7e61ad

  • SSDEEP

    6144:UNyBcLE1Vnfl7IPGI4xT2G4PDtiy6qxQRyAyLXde:oyuuxfl0PumDtiy6xyAyZ

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.6

Botnet

517

C2

https://t.me/huobiinside

https://mas.to/@kyriazhs1975

Attributes
  • profile_id

    517

Signatures

Files

  • 5016-228-0x0000000000400000-0x000000000045B000-memory.dmp
    .exe windows x86


    Headers

    Sections