General

  • Target

    5064-305-0x0000000000E70000-0x000000000148C000-memory.dmp

  • Size

    6.1MB

  • Sample

    220924-b6vrjaada2

  • MD5

    0c702a2bc10053f54506a6ccb552869b

  • SHA1

    5e60bb497c4e3a364bad47a5ecf245cea1035fcd

  • SHA256

    670db27cd7892ce1f79418108514144aa38f8f49ba0b8a372fc7cb1215173467

  • SHA512

    a98fe64df20224a62ca95f287eb6063b52d4c2a8cf2ab83b1c8e250ba75b518696c451d32a12fb748b72e9b43b3c402b9d0a9922e81a8b3d7f2c7b420aa7c987

  • SSDEEP

    98304:FsCj/5Br6h9dPam6C2aJnD9Y7KCg89dbvpbUKakhQJX5dJUs1s3ztrQfy6:ehXaC2aJD9SxjBQKakhYJN1

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.6

Botnet

1679

C2

https://t.me/huobiinside

https://mas.to/@kyriazhs1975

Attributes
  • profile_id

    1679

Targets

    • Target

      5064-305-0x0000000000E70000-0x000000000148C000-memory.dmp

    • Size

      6.1MB

    • MD5

      0c702a2bc10053f54506a6ccb552869b

    • SHA1

      5e60bb497c4e3a364bad47a5ecf245cea1035fcd

    • SHA256

      670db27cd7892ce1f79418108514144aa38f8f49ba0b8a372fc7cb1215173467

    • SHA512

      a98fe64df20224a62ca95f287eb6063b52d4c2a8cf2ab83b1c8e250ba75b518696c451d32a12fb748b72e9b43b3c402b9d0a9922e81a8b3d7f2c7b420aa7c987

    • SSDEEP

      98304:FsCj/5Br6h9dPam6C2aJnD9Y7KCg89dbvpbUKakhQJX5dJUs1s3ztrQfy6:ehXaC2aJD9SxjBQKakhYJN1

    Score
    1/10

MITRE ATT&CK Matrix

Tasks