General

  • Target

    432-162-0x0000000000400000-0x00000000005B0000-memory.dmp

  • Size

    1.7MB

  • MD5

    11820c8f141c028f8ddcbae36047acab

  • SHA1

    68a15ba671759fafc208561f8ffe1269dfcdd21b

  • SHA256

    1172b8a44da17dd2bfef647e7d8b79856782c32dd655487af6659c95bad00ef5

  • SHA512

    7a969feee2f3ef71cd9f82408bd5e5c662fc40b9b04f9e61da4c665281bf89a34a28c1f07a69f406de2e1f6941321f272f5b2821f9d40ff1522c8205ac450e1c

  • SSDEEP

    3072:GT8IHnYWyQxaHybFrLjF6SCyFrAKo2ZnfQa5JKR+mMh7mokDrrb0HqhU1amfo8Mw:GTpfxjF6SCMemIQPmXh7ZhUEmj3682s

Score
10/10

Malware Config

Extracted

Family

vidar

Version

55.2

Botnet

1752

C2

https://t.me/slivetalks

https://c.im/@xinibin420

Attributes
  • profile_id

    1752

Signatures

Files

  • 432-162-0x0000000000400000-0x00000000005B0000-memory.dmp
    .exe windows x86


    Headers

    Sections