General

  • Target

    1496-279-0x0000000000400000-0x0000000000472000-memory.dmp

  • Size

    456KB

  • MD5

    b946fe0e9364bff04bf834f510e7dfc1

  • SHA1

    f2c1bbf6609ddc1d2fe8138efdf2a81ec78e91d3

  • SHA256

    1aba4af78b494fb3ba923aa50dafd88b538fd8668e0505092fc199740421cedb

  • SHA512

    ca5e82eb67ef60e099dccd5caf98e9978142aeed1223439ebdfadafe5b0bc0c2db0386c59dd777a4300b3762fee55266439a5348186375fa777d96990c5fa0bb

  • SSDEEP

    6144:6KpfzMTkFpYnOOeV4mR+OO83puRqHMFatWMYwzbkLsU5dCkJE:6KpfYTkFNv8H83w0MFatTJYLvO

Score
10/10

Malware Config

Extracted

Family

vidar

Version

2.5

Botnet

19

Attributes
  • profile_id

    19

Signatures

Files

  • 1496-279-0x0000000000400000-0x0000000000472000-memory.dmp
    .exe windows x86


    Headers

    Sections