General

  • Target

    1620-157-0x0000000000400000-0x0000000000471000-memory.dmp

  • Size

    452KB

  • MD5

    445ffeeda654aae94f471ad4f8313265

  • SHA1

    af6a2e11cdb36a55bbe3629b4d215b6eec0d9533

  • SHA256

    b17eda60ef0479b296873352fa64bb235345d5d50c326302eaa83bd8a90bf42c

  • SHA512

    f1cd72f2b5edb355290f4210c0ad8156e7733b1e1b0a70cbed9bbd52e8e8a84dd530a41efc66110d66cf1dec9cf6748b050868b4d3d8f045fd2218939371de67

  • SSDEEP

    6144:xpw8kWACDU/STv8wZlUci6JsjBz+SfhNktnUTUAn8fslW:Tw8klCOSXlN0Fz+Sfv2K7n80lW

Malware Config

Extracted

Family

vidar

Version

3

Botnet

d6ef050131e7d5a1d595c51613328971

C2

https://t.me/zaskullz

https://steamcommunity.com/profiles/76561199486572327

http://135.181.87.234:80

Attributes
  • profile_id_v2

    d6ef050131e7d5a1d595c51613328971

Signatures

Files

  • 1620-157-0x0000000000400000-0x0000000000471000-memory.dmp
    .exe windows x86


    Headers

    Sections