General

  • Target

    1600-55-0x0000000000400000-0x0000000000E3D000-memory.dmp

  • Size

    10.2MB

  • MD5

    1f19015c617425b0c72bdf4bbc9c1edc

  • SHA1

    f5e4caa12a2a9fba8b705040341ad17dbd604ad2

  • SHA256

    84484edd32b760515d662ad80b74f22c29ca5566db07a420f6b9a69614e0f68c

  • SHA512

    a527e3bd151468a4ca78005b367578153bd9e3d28158a61f0349768803d386bf9c27fd38f423db445b406b41676c38c3f8f7508be2097e4398f0235c84021025

  • SSDEEP

    196608:qpxUZElBnRv1cWal+UHe6TaS7qgZNEVbyNQKAzg6:qjmElBnRQl+UTTaS7vZNIyNQKAzg6

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.9

Botnet

1707

C2

https://t.me/larsenup

https://ioc.exchange/@zebra54

Attributes
  • profile_id

    1707

Signatures

Files

  • 1600-55-0x0000000000400000-0x0000000000E3D000-memory.dmp
    .exe windows x86


    Headers

    Sections