General

  • Target

    1796-197-0x0000000000400000-0x00000000032A0000-memory.dmp

  • Size

    46.6MB

  • MD5

    2c4ebf54e54b2616364482f9f2b15d75

  • SHA1

    f460183206f819eae8404cf9b4df831889817609

  • SHA256

    e03d9756c29c3b0a4e2807e6f150f6b2bb1f98b7a1d5430e629548cef58bc96d

  • SHA512

    cd7e26fab47219e18e9b6e3314eafb1a96e9e3237d6b0e05d43fb21262ff6268350b993f5c5c929beeb180fa17c20180d40dbd41a45f16b1b1ac6f3dbf8a7386

  • SSDEEP

    12288:CPy+9p2HD970QYzfemkdBSUjmtiV+h2CtY//7cHHlSu2XvRFjb4xh9FaoLRm/Jzo:CPZiD9UemkeFau2gY//An4j5FQu5Bv

Score
10/10

Malware Config

Extracted

Family

vidar

Version

39.8

Botnet

706

C2

https://xeronxikxxx.tumblr.com/

Attributes
  • profile_id

    706

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family

Files

  • 1796-197-0x0000000000400000-0x00000000032A0000-memory.dmp
    .exe windows x86


    Headers

    Sections