General

  • Target

    4348-199-0x0000000000400000-0x000000000045C000-memory.dmp

  • Size

    368KB

  • MD5

    78e693252ae248256fd7c5e11d5202a5

  • SHA1

    901609ca998dfe07e8535a6b8543e51af4edb906

  • SHA256

    c92728f09e70a38335b9f54a9702506bcd648b880c722af83641284f4421cfc8

  • SHA512

    661010c3b855840316d4dfb8c3a14ef9e81516974ac8eee85ae8aa981fc4e4963b46d9c4013038bf6c164cd494d2866846777104d84e4d0e780b480c3a10bb29

  • SSDEEP

    3072:NfSINxfpjy70ebdwhFBBgWknWP47dS4Y0CFBALwZZRwp1Wzvmfq6lUgHmv47F3:NraZmFBW3xXS+EBwazMq6lUfY3

Score
10/10

Malware Config

Extracted

Family

vidar

Version

55.5

Botnet

517

C2

https://t.me/tg_turgay

https://ioc.exchange/@xiteb15011

Attributes
  • profile_id

    517

Signatures

Files

  • 4348-199-0x0000000000400000-0x000000000045C000-memory.dmp
    .exe windows x86


    Headers

    Sections