General

  • Target

    4684-138-0x0000000000400000-0x000000000047A000-memory.dmp

  • Size

    488KB

  • MD5

    915c7163a16bd391ec2220cd6f972547

  • SHA1

    1b1c6b7f6302c79d90078ccf9ecf940c911af687

  • SHA256

    dd723308ea7bebc72b13b0125af4ead3f98ef3595e18d10ece9ca26be8192f74

  • SHA512

    bbd491ffa73b50a0bd33366a182f6b75c9b189818c8bc8938861950a8495593cae62718b58a702a129cfa524811d26a1b7cf6c0021c3304b7e55a249fb798abb

  • SSDEEP

    6144:oVv/3min9NW2AzQTShI21g6BCW7zfmSazcn4v479HwymU5AxuY5KAlJQY4QY:8v/33ntA8A1phKJcn4vsQygbnlJQ7Q

Malware Config

Extracted

Family

vidar

Version

2.9

Botnet

6f1b95d33a45c206781d58438f38e87a

C2

https://t.me/nemesisgrow

https://steamcommunity.com/profiles/76561199471222742

http://65.109.12.165:80

Attributes
  • profile_id_v2

    6f1b95d33a45c206781d58438f38e87a

Signatures

Files

  • 4684-138-0x0000000000400000-0x000000000047A000-memory.dmp
    .exe windows x86


    Headers

    Sections