General

  • Target

    1680-207-0x0000000000400000-0x0000000000463000-memory.dmp

  • Size

    396KB

  • MD5

    9171f45ad4e6e7ba38e5f0a9ec184bdb

  • SHA1

    3b1200cacbc539286c22094cd529b6d0e33d338e

  • SHA256

    4c6d5a82651870c4e420b235ce445f42d14f002ca5598718403d640bb878fcfc

  • SHA512

    17c72070290a9912c06c97d5446efab31a735a041b528d391748cadcf3ea3dbfd8418fe47f5d8d65708d88da2cad6e7ceceed67b0e66e3bbaed3a899010c557d

  • SSDEEP

    6144:87RuJ65bQbNrJOc7WW1LYEGDX61jtcvsyE/35/3TvYyk6Y:KuJ65b6NVTWWjD1jtM+35/3TgyJ

Score
10/10

Malware Config

Extracted

Family

vidar

Version

55

Botnet

517

C2

https://t.me/truewallets

https://mas.to/@zara99

http://116.203.10.3:80

Attributes
  • profile_id

    517

Signatures

Files

  • 1680-207-0x0000000000400000-0x0000000000463000-memory.dmp
    .exe windows x86


    Headers

    Sections