General

  • Target

    101012-332-0x0000000000400000-0x00000000005A4000-memory.dmp

  • Size

    1.6MB

  • MD5

    7ee1791d36ec15137ac5e8b6b82c9b8f

  • SHA1

    3422ff3335785c08523b503f759a06b728117b06

  • SHA256

    e398662888f46e60c1968869c183231b3e6537d43e4a79cb559041d08b378ac2

  • SHA512

    8b956b7ccd029694c8bbe2d2528e0f3a45010aec3935ae7a8bd6e10c5a1bf21da0570fc9b77a78bb7b704904f5a56ea3aebb928b645bb36d2c342c593e4e5715

  • SSDEEP

    6144:+NyBcjMR9zvNTMbGI41T2W4bXtiy6vxQRy+OU9OeqTtj:ayWadvNIbu2Xtiy6ky+OdvTt

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.6

Botnet

1684

C2

https://t.me/huobiinside

https://mas.to/@kyriazhs1975

Attributes
  • profile_id

    1684

Signatures

Files

  • 101012-332-0x0000000000400000-0x00000000005A4000-memory.dmp
    .exe windows x86


    Headers

    Sections