General

  • Target

    3184-201-0x0000000000400000-0x000000000045E000-memory.dmp

  • Size

    376KB

  • MD5

    e5c458f13bab7b23c785132614dee388

  • SHA1

    c3c6bc5694588337ca3cc4b81ab8e308cf3a5cc6

  • SHA256

    ec18683832f5ef77dc4378af921997e34ccd5db17369b62dd7037f4e2ae259b3

  • SHA512

    e14dca44609997980bf859209e6d39d5db6db6fd8b9abc0e8e9c2739421bcc6fbf497143ceed5e69e57d8d90d78a1c4bd65e0d871289ea20fb0b82df0fe8ffab

  • SSDEEP

    6144:1tYFXadjWWgn3dZA0mI4saivXG2TcrJKddMVGNwXLDC:TjSn3dW0OM0JKHyGNwX

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.9

Botnet

517

C2

https://t.me/larsenup

https://ioc.exchange/@zebra54

Attributes
  • profile_id

    517

Signatures

Files

  • 3184-201-0x0000000000400000-0x000000000045E000-memory.dmp
    .exe windows x86


    Headers

    Sections