General

  • Target

    1500-59-0x0000000000A70000-0x0000000001398000-memory.dmp

  • Size

    9.2MB

  • MD5

    81eee89ce182d503b7264147c049f0cb

  • SHA1

    d358a18e5448c6f6b24c1f4f7f2da5026be041a7

  • SHA256

    00ae3577e6ccdc80c5f655bea74a7efa82b56e63458f787f9f739b9ea14724c1

  • SHA512

    d384cbc31db7eb98775d89b493d3a9268e9880cd02dfb18da58063091de9546dc19789167c343b4a04b5c5fd632d4c17ed366f104b0c29e1aaee36f6f3d27dc6

  • SSDEEP

    98304:oBMqnxczu4hvG4TgsCLMjG7ZSD0UruI2fHyQEY0JIi4VaLGGteqp8OH7FCUG:rtndruLHKGi4VqGG9XFX

Score
10/10

Malware Config

Extracted

Family

vidar

Version

55

Botnet

1679

C2

http://138.201.90.120:80

Attributes
  • profile_id

    1679

Signatures

  • Vidar family
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

Files

  • 1500-59-0x0000000000A70000-0x0000000001398000-memory.dmp
    .exe windows x86


    Headers

    Sections