General

  • Target

    1992-59-0x0000000000400000-0x0000000000D3A000-memory.dmp

  • Size

    9.2MB

  • MD5

    fac39e2cbacc48e90f2ea37c29dc51d6

  • SHA1

    24126a5ea8ae8cda62292d54ddcd864fe3dbefcb

  • SHA256

    91be550b9ddcea9f9bdebeb1512f5d56a3a4d2d35d3e525a81c09b8b7ae5df7f

  • SHA512

    5e020f4a74ea4daf22c0533063ab3b838d653470c46882bb55f14bb5070a06b9f18c32fb641ee368396a50662c6ad5cdd46331e0b69bfbd13f10c1e010e0da56

  • SSDEEP

    196608:s808QyVG/1XJyfdxnixVzeV4kHyGYbtJ8+8rmocfDovm:s8OSG/tWdRuEV4kHsbtJ8+StcfEv

Score
10/10

Malware Config

Extracted

Family

vidar

Version

55.5

Botnet

1795

C2

https://t.me/tg_turgay

https://ioc.exchange/@xiteb15011

Attributes
  • profile_id

    1795

Signatures

Files

  • 1992-59-0x0000000000400000-0x0000000000D3A000-memory.dmp
    .exe windows x86


    Headers

    Sections