General

  • Target

    1340-554-0x0000000000400000-0x00000000004AA000-memory.dmp

  • Size

    680KB

  • MD5

    d00295dc3c36f44dd231cd7c77d4c0e6

  • SHA1

    d593188ed835689c871b18a0da5097b0ef6802a9

  • SHA256

    7e2f1e46ce05a38ff40981aa5fcfd69baca7cf5e5104660ed7724b16977e6d22

  • SHA512

    619353be685788f279c62e6429ac2320a8e42430fa0235c889fc006a7b730d7724aa102e1aa337c15086918336e669b5e0fc4e0ebd108a372b73d0cf7ee529c1

  • SSDEEP

    12288:RPy+9p2HD970QYzfemkdBSUjmtiV+h2CtY//7cHHlSu2XvRFj54wh9FaoLRm/Jz5:RPZiD9UemkeFau2gY//An4j5Fah5Bl

Score
10/10

Malware Config

Extracted

Family

vidar

Version

39.8

Botnet

828

C2

https://xeronxikxxx.tumblr.com/

Attributes
  • profile_id

    828

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 1340-554-0x0000000000400000-0x00000000004AA000-memory.dmp
    .exe windows x86


    Headers

    Sections