General

  • Target

    3684-154-0x0000000000400000-0x0000000000DD5000-memory.dmp

  • Size

    9.8MB

  • MD5

    fdce3e79d77a42472fb461a42fadfe1f

  • SHA1

    9ad9c1451cfe2fcce586d7eaf2c417258a2662a1

  • SHA256

    8ea7d7f5055e156d0de9cec06c628c35059421b7c402ad33522e69d23aa76a6e

  • SHA512

    3074d98f95d04a5913068dc576dad538c5f7d1f43e75e8b3973e1c6f6558d9f8d076a2784fdd3887afb8dcd921e004fbc3ea860cf36f236c50e4c4ab5dda3f48

  • SSDEEP

    196608:NWQ8NIciLrmFNGS2srSPl88OU9cJqNEMj5wkhpq8cxB636ndBYdfRC:NWQEiKNcsrM8eMqNEM6yqsKnd6

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.6

Botnet

1531

C2

https://t.me/huobiinside

https://mas.to/@kyriazhs1975

Attributes
  • profile_id

    1531

Signatures

Files

  • 3684-154-0x0000000000400000-0x0000000000DD5000-memory.dmp
    .exe windows x86


    Headers

    Sections