General

  • Target

    3880-206-0x0000000000400000-0x000000000045E000-memory.dmp

  • Size

    376KB

  • MD5

    84338dddaaa2108b2d6dec7b131f842f

  • SHA1

    b60e67bb59a3bb1e207118dd259b73595d5fb3a0

  • SHA256

    b3302889d8b7d7ecdaf784580002711675f027ca72df81de5d842548d235fb5b

  • SHA512

    68e6aa9e2279e4c1fe60496f8c48e9fc8f9874e3a9e6a79e66f74c88720666214ceea924a1c816f32c3da0c93baf08c743f8ea23731c62629033675eaf06ece4

  • SSDEEP

    6144:1tYFXadjWWgn3dZA0mI4saivXG2TcrJKddjVGNwXLDC:TjSn3dW0OM0JKH5GNwX

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.9

Botnet

517

C2

https://t.me/larsenup

https://ioc.exchange/@zebra54

Attributes
  • profile_id

    517

Signatures

Files

  • 3880-206-0x0000000000400000-0x000000000045E000-memory.dmp
    .exe windows x86


    Headers

    Sections