General

  • Target

    1944-55-0x0000000000750000-0x00000000007B9000-memory.dmp

  • Size

    420KB

  • MD5

    bf83ab5f5ffd15494c8e1b65261b5453

  • SHA1

    39e9e9faa85b08bc425cbe11031abaad42656366

  • SHA256

    ed4b73c736c29af36f40f31a9c0555457ad88bbf94ee543d0dbf33501ff9e463

  • SHA512

    8f501843aa9c6d0e3bbaa1317ea894482253d6b4aa3e63a4152a91fa3f807fd93fdfdc713aceb139479ed20fd4b5f89a55421908524f4ee524ce5c165c687aad

  • SSDEEP

    12288:WJmQ1DNEP6x9ZWn7C+d5I4vhW/lgjN72:A1DNnx9ZECMC4U/KjN6

Score
10/10

Malware Config

Extracted

Family

vidar

Version

55

Botnet

1014

C2

https://t.me/truewallets

https://mas.to/@zara99

http://116.203.10.3:80

Attributes
  • profile_id

    1014

Signatures

Files

  • 1944-55-0x0000000000750000-0x00000000007B9000-memory.dmp
    .exe windows x86


    Headers

    Sections