General

  • Target

    1916-142-0x0000000000400000-0x00000000008E3000-memory.dmp

  • Size

    4.9MB

  • MD5

    e7f6f744fb04922709b7409b6920c94e

  • SHA1

    28237763d57d8150479dea20c945e12e2818e59a

  • SHA256

    9558b0d4ddbaef21edb6c35fa1c9f867d92b48220fdb8aa3b73823a007e7868b

  • SHA512

    69648d66ddb4ecdcc6a6a9ffde08988d63cafa07a6af302afd38fef48c3169db7178905d268faa1ec43753d7820c6db9bc5cba6447449614c6c25629ee527b37

  • SSDEEP

    24576:M+6cZEdC7zw+P4vGYAb4Qqcgva6cfxoHds:X/Kd4P4vecygy/2HS

Score
10/10

Malware Config

Extracted

Family

vidar

Version

41.5

Botnet

937

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    937

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 1916-142-0x0000000000400000-0x00000000008E3000-memory.dmp
    .exe windows x86


    Headers

    Sections