General

  • Target

    640-213-0x0000000000400000-0x000000000045B000-memory.dmp

  • Size

    364KB

  • MD5

    7f5cec77e93ebc91a4c87402637bbf77

  • SHA1

    96e5120807e1606faa8a8546d48b935b994dff4f

  • SHA256

    74326f33beda9f74d3022f7ca8b4708e0b817b2d295d7093f9f9bb961b551962

  • SHA512

    272670c53fd9bd84a6ee22fbd7deccecc1d2a2cd4b3f72bc812608fbc751c37cb87aef75b141cc8f87971f89233a3361140ad06cbd0977979a4274306f63c51a

  • SSDEEP

    6144:UNyBcLE1Vnfl7IPGI4xT2G4PDtiy6BxQRyAyAXde:oyuuxfl0PumDtiy6uyAyY

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.6

Botnet

517

C2

https://t.me/huobiinside

https://mas.to/@kyriazhs1975

Attributes
  • profile_id

    517

Signatures

Files

  • 640-213-0x0000000000400000-0x000000000045B000-memory.dmp
    .exe windows x86


    Headers

    Sections