General

  • Target

    1708-64-0x00000000000C0000-0x0000000000131000-memory.dmp

  • Size

    452KB

  • MD5

    6c3e57e9483cee003b7f7c36907dda44

  • SHA1

    9320eede60ac44904bb007cf41c9cd6e3abe5bee

  • SHA256

    be94ea8b0913dbe2893e15084f2207f85f29f22745eefd285314050f98918b31

  • SHA512

    f5e53010c34762029f1ebee178e0f86c98c13f3d0ee2888f602392ee3b2061b29ccbc1f017a6e7874e1a28b4516fc311152632a37529ef2c3bc80038eba71140

  • SSDEEP

    12288:epMYbMy2FW2jhQF62t1g0AL6qTS200FW:evMFk2kt1gNlD5E

Malware Config

Extracted

Family

vidar

Version

3

Botnet

2548f166286a0b36dbfd9f8a1ac09311

C2

https://t.me/zaskullz

https://steamcommunity.com/profiles/76561199486572327

http://135.181.87.234:80

Attributes
  • profile_id_v2

    2548f166286a0b36dbfd9f8a1ac09311

Signatures

Files

  • 1708-64-0x00000000000C0000-0x0000000000131000-memory.dmp
    .exe windows x86


    Headers

    Sections