General

  • Target

    1492-58-0x0000000000400000-0x000000000085F000-memory.dmp

  • Size

    4.4MB

  • Sample

    221106-sh7vmaagck

  • MD5

    db1d2b91e6a779b2a7118f6129eed213

  • SHA1

    30c71c920038201f5b0103a10c32900ba20db859

  • SHA256

    0faf49e2c19a5b10f745067d135903c9e08406e22bed1c04ce8f568dbd5dfd9e

  • SHA512

    b22095df267c0fa31ef6395d1648848f5a24d9ec9ba08aef36a3626d1a22fa736bf6a9679165e771357c64f3116eb11a69697e152486ca7bf5a110f7e87f5333

  • SSDEEP

    3072:RfSINxfpjy70ebdwhFBBgWknWP47dS4Y0CFBALwZZRwp1Wzyfq6vUgHmMuqgz7Fy:RraZmFBW3xXS+EBwazQq6vU89439T

Score
10/10

Malware Config

Extracted

Family

vidar

Version

55.5

Botnet

937

C2

https://t.me/tg_turgay

https://ioc.exchange/@xiteb15011

Attributes
  • profile_id

    937

Targets

    • Target

      1492-58-0x0000000000400000-0x000000000085F000-memory.dmp

    • Size

      4.4MB

    • MD5

      db1d2b91e6a779b2a7118f6129eed213

    • SHA1

      30c71c920038201f5b0103a10c32900ba20db859

    • SHA256

      0faf49e2c19a5b10f745067d135903c9e08406e22bed1c04ce8f568dbd5dfd9e

    • SHA512

      b22095df267c0fa31ef6395d1648848f5a24d9ec9ba08aef36a3626d1a22fa736bf6a9679165e771357c64f3116eb11a69697e152486ca7bf5a110f7e87f5333

    • SSDEEP

      3072:RfSINxfpjy70ebdwhFBBgWknWP47dS4Y0CFBALwZZRwp1Wzyfq6vUgHmMuqgz7Fy:RraZmFBW3xXS+EBwazQq6vU89439T

    Score
    1/10

MITRE ATT&CK Matrix

Tasks