General

  • Target

    2824-492-0x0000000000400000-0x00000000004CD000-memory.dmp

  • Size

    820KB

  • MD5

    53ac02a22daa1bc505528d115d35c368

  • SHA1

    5608891d26481bbdd69aa2a88262b93d6d10392e

  • SHA256

    c12ab8ced8278e510d351a12e9d505e615403d270b10c7c8b4bfc7625ed0c5e6

  • SHA512

    333058a1fae17ccd072ce13ef62030ee53d430568abd135a59f47c7a8f447cab5ebc55ff979ef49fe61f4b97dd018ebfe4555bf103b73d02b03f8280e824b3cd

  • SSDEEP

    24576:DoBRzK9WagJpaI0zPIPKSnAMhPvtXy/p4IIqiwk+n1zmhf/V:DoBKWbnahjIP5nA4vtXQp4Ili/+5Uf/V

Score
10/10

Malware Config

Extracted

Family

vidar

Version

50.6

Botnet

937

C2

https://mas.to/@s4msalo

https://koyu.space/@samsa2l

Attributes
  • profile_id

    937

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 2824-492-0x0000000000400000-0x00000000004CD000-memory.dmp
    .exe windows x86


    Headers

    Sections