General

  • Target

    4792-250-0x0000000000400000-0x00000000005B0000-memory.dmp

  • Size

    1.7MB

  • MD5

    9029fdd24a536e0be8f57b263291fdda

  • SHA1

    5cca14d5e0aaa629b5d6a0e74be0abf2f3093420

  • SHA256

    6ee5e134d6318f158271cecdf540471619be662bc7b499dd96d0ee2d3ad1bd63

  • SHA512

    f9fdd3231eea16456ae7b69d0abd7850fa7c2f1d76b51296ab2163bdfa0f47d580ebd09aaf11525ba3ea29539ed658e71a93bbf583f2e2baab2df0186cd3c871

  • SSDEEP

    3072:GT8IHnYWyQxaHybFrLjF6SCyFrAKo2ZnfQa5JKR+mMh7mmkDrrb0HqhU1amfoBwa:GTpfxjF6SCMemIQPmX37ZhUEmCx6E2s

Score
10/10

Malware Config

Extracted

Family

vidar

Version

55.2

Botnet

1752

C2

https://t.me/slivetalks

https://c.im/@xinibin420

Attributes
  • profile_id

    1752

Signatures

Files

  • 4792-250-0x0000000000400000-0x00000000005B0000-memory.dmp
    .exe windows x86


    Headers

    Sections