General

  • Target

    1672-60-0x0000000000400000-0x0000000000CE9000-memory.dmp

  • Size

    8.9MB

  • MD5

    8a3ff279dee18a74433875fdafbd6662

  • SHA1

    a40c01fb1c9955c1d8597cd5c738727accb97ca2

  • SHA256

    646414f1d959595680a77980979fa11c0f09eb1e96a42b1b3c7228928a03a2ac

  • SHA512

    cf8f726cb443c8bc21f85fb74a1f9d45821272b137b1eb7afbcf46fb07f10db01c9898132edd5714765da46e3e8f933f6264dea21a40b6b64b28c378cae4d1cc

  • SSDEEP

    196608:5FKDJq01grJFA2S0O+swp+aanYfiDTOl8uz28/FO:5FIJq0QFxbhJ+aBrl8TeO

Score
10/10

Malware Config

Extracted

Family

vidar

Version

54.9

Botnet

1679

C2

https://t.me/larsenup

https://ioc.exchange/@zebra54

Attributes
  • profile_id

    1679

Signatures

Files

  • 1672-60-0x0000000000400000-0x0000000000CE9000-memory.dmp
    .exe windows x86


    Headers

    Sections