General

  • Target

    708-71-0x0000000000400000-0x0000000000E3D000-memory.dmp

  • Size

    10.2MB

  • MD5

    afe4cc26daac435622db246b169d5efc

  • SHA1

    5f699932f3f00a8ba16c856b88a24c9c96c7a690

  • SHA256

    f6a3c35c2e00ba8912d3d4e337372fddede9b083f31aaa4ed81443d7ab560b55

  • SHA512

    973c763afa9402df4d6abe3b0e5d3ff06cf71356cb966b54f668c3de4a97e87d984a574f8fc2f8e1594654ae6693427ffcc43f80d69cbd9fc6e5893f7e7cd2c2

  • SSDEEP

    196608:3F+PZEhwR7A1cWal+UHe6TaS7qgZNEVbyNQKAzg6:3kxEhwR7dl+UTTaS7vZNIyNQKAzg6

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.9

Botnet

1707

C2

https://t.me/larsenup

https://ioc.exchange/@zebra54

Attributes
  • profile_id

    1707

Signatures

Files

  • 708-71-0x0000000000400000-0x0000000000E3D000-memory.dmp
    .exe windows x86


    Headers

    Sections