General

  • Target

    3972-339-0x0000000000400000-0x0000000000471000-memory.dmp

  • Size

    452KB

  • MD5

    137b244e7122cfdc3d75b3ddd8dbade3

  • SHA1

    f1c00059069f7d6e489012015329c4b94856856b

  • SHA256

    e55522db4272da92ad99dbe9c2636cc5ea5b16a9e83c6bfd37ffbf5617b79f16

  • SHA512

    91083899c284978512d5ad47ed0e3f385f0541165dafa3abe7cfa117a4f9f6bcb1ec677337ea689edb958da198002cf03effe20b03e46293057cf2c3f73021f8

  • SSDEEP

    6144:xpw8kWACDU/STv8wZlUci6JsjBz+Sf2NktnUTUKn8fslW:Tw8klCOSXlN0Fz+SfW2KNn80lW

Malware Config

Extracted

Family

vidar

Version

3

Botnet

d6ef050131e7d5a1d595c51613328971

C2

https://t.me/zaskullz

https://steamcommunity.com/profiles/76561199486572327

http://135.181.87.234:80

Attributes
  • profile_id_v2

    d6ef050131e7d5a1d595c51613328971

Signatures

Files

  • 3972-339-0x0000000000400000-0x0000000000471000-memory.dmp
    .exe windows x86


    Headers

    Sections