General

  • Target

    1916-198-0x0000000000400000-0x000000000094A000-memory.dmp

  • Size

    5.3MB

  • MD5

    2abec25f56e7bfe9d9f920b5a6108a5f

  • SHA1

    e08bc9e25cb0440b5adf7758e5d557b15ea927ff

  • SHA256

    2c18079eaa642d58fc3b902d07025cba5933e346c16f33b068f1cb2a3919cdd8

  • SHA512

    84c0e8b190ce023d8e0dfb45c8a4fdbeb70b82de669c1f5f1e3dc787ff03befa35e328b4fdad2fef849fa7cb78f7493382ceb012365c99ce8effec66bbd1bdeb

  • SSDEEP

    24576:lP/k69a/bcq76tndALvBDXrBVKIOzRVz+:2Ea/bcq7EOLZLrBC9V6

Score
10/10

Malware Config

Extracted

Family

vidar

Version

39.4

Botnet

706

C2

https://sergeevih43.tumblr.com/

Attributes
  • profile_id

    706

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 1916-198-0x0000000000400000-0x000000000094A000-memory.dmp
    .exe windows x86


    Headers

    Sections