General

  • Target

    100072-188-0x0000000000400000-0x00000000005A4000-memory.dmp

  • Size

    1.6MB

  • MD5

    43d89a685d907872088c3d46d57da02c

  • SHA1

    73abeec7f233bbc528ecb8227522dd54fc035e4f

  • SHA256

    f08b9115b7820dd18544bb99a255266c235b9cb2ca42f9bf7c9c6054e3d0a651

  • SHA512

    b8a76c992084091fb733ee95812c84c861df28c228c8a20f2d1804828417b9be00bb7789c3d8b2e50abd8de007e03586c52d4fb62ea1e06d536f896eea84e1f3

  • SSDEEP

    6144:+NyBcjMR9zvNTMbGI41T2W4bXtiy6yxQRy+OLg9e1Ttj:ayWadvNIbu2Xtiy6Jy+OWYTt

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.6

Botnet

1684

C2

https://t.me/huobiinside

https://mas.to/@kyriazhs1975

Attributes
  • profile_id

    1684

Signatures

Files

  • 100072-188-0x0000000000400000-0x00000000005A4000-memory.dmp
    .exe windows x86


    Headers

    Sections