General

  • Target

    4280-138-0x0000000000400000-0x0000000000472000-memory.dmp

  • Size

    456KB

  • MD5

    a39f306f789025fa4f15e32829b6d91a

  • SHA1

    9494e310a956031aa0714aef4c81f0a93eef0302

  • SHA256

    f36ffba70ebf57196ec3522fb373f7acd3909168a7d8496b55b9d058fdb64c0a

  • SHA512

    db40a6d7298105ecc9ecf45ea3fd015cdd8cf0c0b9cc6c95bb8bae28948694d1d356bb823f3352fb9690dde4a936ee09b6a1cbc0a1c99cc17a4ebac671c644fa

  • SSDEEP

    6144:WKpfzMTkFpYnOOeV4mR+OO83puRqHMFatWMYwzbkL6U5dCkJR:WKpfYTkFNv8H83w0MFatTJYLBj

Score
10/10

Malware Config

Extracted

Family

vidar

Version

2.5

Botnet

695

Attributes
  • profile_id

    695

Signatures

Files

  • 4280-138-0x0000000000400000-0x0000000000472000-memory.dmp
    .exe windows x86


    Headers

    Sections