General
-
Target
2060-463-0x000000000042029C-mapping.dmp
-
Size
651KB
-
MD5
bcee2fb3b1198dc33acd876371c16782
-
SHA1
11b98035765126af7ce1c8c210f206a6d65315ae
-
SHA256
8ec94647f59a03d9f57fc6dd03f153636decd084eb2fc935b52a26e10f27e525
-
SHA512
9adcf28fe3b9f4d23c84ef1c74ec77e0fbffc3ee3037ca7337d397f5f9668eb9d5b119126b9923f065808fe148693244cb8f73f7d636ba8d5c541dbe38d7a2d3
-
SSDEEP
6144:2VraZmFBW3xXS+EBwazMq6lUf23BraZmFBW3xXS+EBwaznq6lUPy3Y:qGQBeXEBwcF6TGQBeXEBwcq6K
Malware Config
Extracted
Family
vidar
Version
55.5
Botnet
517
C2
https://t.me/tg_turgay
https://ioc.exchange/@xiteb15011
Attributes
-
profile_id
517
Signatures
-
Vidar family
Files
-
2060-463-0x000000000042029C-mapping.dmp