General

  • Target

    1048-64-0x0000000001210000-0x0000000001B73000-memory.dmp

  • Size

    9.4MB

  • MD5

    b9a65c64d482ac64971bb56d54fd8ad0

  • SHA1

    f9971fa2f7f938298a5ff8790eff7c78a9a45f03

  • SHA256

    68d4698562439e21468176f8fe7815c63adb0001f4f5899fd75c36154f77463f

  • SHA512

    adb674fabc3c5a0f07e118d7d39ad0d24d64161ac31cc77b097783868278c2e667e8916384846c1ce8ae1aa11c554afe555370ee1ba6b7471841bc59d5c7e038

  • SSDEEP

    196608:6oicgSDe/xRn9SUhKx+HvqS3lRBKVrWQu98aU7E8+:6oLgSDIxj/hmsxec98aU7E8+

Malware Config

Extracted

Family

vidar

Version

54.7

Botnet

1679

C2

https://t.me/trampapanam

https://nerdculture.de/@yoxhyp

Attributes
  • profile_id

    1679

Signatures

  • Vidar family
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

Files

  • 1048-64-0x0000000001210000-0x0000000001B73000-memory.dmp
    .exe windows x86


    Headers

    Sections