General

  • Target

    2036-55-0x0000000000150000-0x00000000001B9000-memory.dmp

  • Size

    420KB

  • MD5

    05bec687de4cb29ff78d448343cd0d9d

  • SHA1

    287700db6e84e4072721b4821d072ba9034b0220

  • SHA256

    9c093202dde899d6de97c47bc4454ef84a9452335178598f7ea562000fe7a994

  • SHA512

    b578d511c8dcc5acadbab8738d2de51f2c87c3b0f1e33bf8a812cfa1293951cb9989ac8ea04cda30990a214d019cd6ef53032c8cbe86ce301a03b8f41c5532ef

  • SSDEEP

    6144:Un6WmQ1lFNybrqI06zg7wDdrpiedyf1KvBW/bvYDnp/1OBM:ZWmQ1jNE106ccbiedi4vBW/bgDK2

Score
10/10

Malware Config

Extracted

Family

vidar

Version

55

Botnet

1721

C2

https://t.me/truewallets

https://mas.to/@zara99

http://116.203.10.3:80

Attributes
  • profile_id

    1721

Signatures

Files

  • 2036-55-0x0000000000150000-0x00000000001B9000-memory.dmp
    .exe windows x86


    Headers

    Sections