General

  • Target

    1680-197-0x0000000000400000-0x000000000094A000-memory.dmp

  • Size

    5.3MB

  • MD5

    1d9c81084cd2da49fe1dff244f25ef4f

  • SHA1

    b9c932d0df23c58e23e39406941e06dc55271c7c

  • SHA256

    67767d26dc696922715ed1ac398173d9f60af080732f061bc3ca77809d778a35

  • SHA512

    b114ca36b40e7e6560b2783ab62f1a3fdf346242d17726c3cab6f84b2e2e4e71ad89e34313601e0174218666d3195264b440ec7efd3b6e967a42558e492da58c

  • SSDEEP

    24576:lP/k69a/bcq76tndALvBDXrBVvIOzRVF2X:2Ea/bcq7EOLZLrBL9VF2X

Score
10/10

Malware Config

Extracted

Family

vidar

Version

39.4

Botnet

706

C2

https://sergeevih43.tumblr.com/

Attributes
  • profile_id

    706

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 1680-197-0x0000000000400000-0x000000000094A000-memory.dmp
    .exe windows x86


    Headers

    Sections