General
-
Target
2000-56-0x0000000000320000-0x000000000037F000-memory.dmp
-
Size
380KB
-
MD5
ac2a9206b27919a4389938523ab8c70b
-
SHA1
7413a319eb8bc3f2a9b314630ef7f11140d9aa6b
-
SHA256
0909e2c0556d4f885ef2c7e35509ea9f4a4f30a1fa54b86ad5b709f48952c538
-
SHA512
ed312fe57492142e635418f5f00b853090080c95aab8baf967e5bbeafb3cfcd47c63b434a3e7164ed21b91ef782fa1e2457f555b60e730034295a3e0afefdef1
-
SSDEEP
6144:TpRQ6HXn/iwbIWI4hvWk/fbXmloLJiKa/6:TpROcIeFbXmleJiKo
Malware Config
Extracted
Family
vidar
Version
54.1
Botnet
1587
C2
https://t.me/tigogames
https://ioc.exchange/@tiagoa26
Attributes
-
profile_id
1587
Signatures
-
Vidar family
Files
-
2000-56-0x0000000000320000-0x000000000037F000-memory.dmp