General

  • Target

    1732-63-0x0000000000400000-0x000000000045B000-memory.dmp

  • Size

    364KB

  • MD5

    87bb39dda804f2a7d6ca89ed69ac54ec

  • SHA1

    e6d9f9d1640d1f5a96f2744306160601d7c4653a

  • SHA256

    8ac80355e70882845416bd77e1855448a7eda47d6f7f7bd17850a5bb53fc22ff

  • SHA512

    7a0d2908234c55670e323499ec6f67966d9e3ed66c10de463fc0bc55214e2ee412d3fc4e7587f5c9380dc875c65dd5ef015dd8963fa6fbd496e1ce795f054a80

  • SSDEEP

    3072:W7lgGlf4+EMQMVjd3LQ8VdRI40I683JqlrmtFi6ypaE0bWZYNmGCbDf:gl5x8MVxLxHRI40I6+yAi6jrCZYN+

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.7

Botnet

1663

C2

https://t.me/trampapanam

https://nerdculture.de/@yoxhyp

Attributes
  • profile_id

    1663

Signatures

Files

  • 1732-63-0x0000000000400000-0x000000000045B000-memory.dmp
    .exe windows x86


    Headers

    Sections