General
-
Target
4972-658-0x0000000000429CBD-mapping.dmp
-
Size
709KB
-
MD5
a24b36d3a6aff9fb959d5fc85fa3d421
-
SHA1
9a3059e91e23e7d6117e1ed3e6495c428721f922
-
SHA256
b65a722ece6e6b747acc7c518deeb4fc859a58c0b3c93f8e9d38ccfdfd772a5f
-
SHA512
11baf8cdd4dffd937e1db6e9f50ff8fe47da120aa3d9249d4bcaa75ffafe1ca5ca71308564674eb2c1dc16e2bf3f2154af9a5282ffaec87e5a3205fa55a829a4
-
SSDEEP
12288:ouJ65b6NVTWWjD1jtM+35/3fgyJ7uJ65b6NVTWWjD1jtM+35/3kgyJ7:oLb6NxWWn1pM+B34yJ7Lb6NxWWn1pM+2
Malware Config
Extracted
Family
vidar
Version
55
Botnet
517
C2
https://t.me/truewallets
https://mas.to/@zara99
http://116.203.10.3:80
Attributes
-
profile_id
517
Signatures
-
Vidar family
Files
-
4972-658-0x0000000000429CBD-mapping.dmp