General

  • Target

    304-259-0x0000000000400000-0x000000000094A000-memory.dmp

  • Size

    5.3MB

  • MD5

    e8fffcaea950d6836f744ab98e0102f6

  • SHA1

    b6501a8ee02b7976623b22d275c18dd3b551eec3

  • SHA256

    18aaf8c5f5b65df75d9abf519938e42230ffcbd31ceeffd527f47a5204771c39

  • SHA512

    f1a158a21271b097a66fd2cc9f2a403b965366f50c95cd2140cc3ab176147ac1179ac50e91476229102f6326721fcea0ba96be8968b48c46764a57895eae4efd

  • SSDEEP

    24576:lP/k69a/bcq76tndALvBDXrBV9IOzRVL:2Ea/bcq7EOLZLrBN9VL

Score
10/10

Malware Config

Extracted

Family

vidar

Version

39.4

Botnet

706

C2

https://sergeevih43.tumblr.com/

Attributes
  • profile_id

    706

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 304-259-0x0000000000400000-0x000000000094A000-memory.dmp
    .exe windows x86


    Headers

    Sections