General

  • Target

    3420-199-0x0000000000400000-0x000000000045E000-memory.dmp

  • Size

    376KB

  • MD5

    95b076aedbd68b8ea60987edd57a0885

  • SHA1

    37fc25a68fe361fc23b50a9ea1dabf10a861e508

  • SHA256

    5e1a73ca2639f5e7e1a0ad06762b43df8e44c5db8d7416354c5842979182238f

  • SHA512

    ef7987422132194ef81b8251b7498d4698303208147f9145478d5eed0bf830fa5088187569a6ef6f782178b71071e24d1dfbb4f63c90608fafab74ac1dff4362

  • SSDEEP

    6144:1tYFXadjWWgn3dZA0mI4saivXG2TcrJKddmVGNwXLDC:TjSn3dW0OM0JKHkGNwX

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.9

Botnet

517

C2

https://t.me/larsenup

https://ioc.exchange/@zebra54

Attributes
  • profile_id

    517

Signatures

Files

  • 3420-199-0x0000000000400000-0x000000000045E000-memory.dmp
    .exe windows x86


    Headers

    Sections