General

  • Target

    4092-1504-0x0000000000400000-0x000000000046C000-memory.dmp

  • Size

    432KB

  • MD5

    e00b0795e4c71bf52208e2d1c6eae6c6

  • SHA1

    625a15c481d5b1a2d148c70e57dbe35297827054

  • SHA256

    58b48e812a204da33619d33ca05eb12e36ee556e9b3c1d2f9d576ebd021f0ec4

  • SHA512

    25ec867c62f831675125db78062d4708abd023dfb4cc9f69c17b0228ed9846d5d32ac321a0d83d90f830292605d4b9a5e4240f380102d556606962d960ecfb13

  • SSDEEP

    6144:cuQRHexo0nwlQvG4IyynVKzVKJ5/eRFHVmGi0/9o0wVEhKhhIa:cuQRHexo0n24zVK32RRVmGi2wVbha

Malware Config

Extracted

Family

vidar

Version

3.1

Botnet

00d92484c9b27bc8482a2cc94cacc508

C2

https://steamcommunity.com/profiles/76561199472266392

https://t.me/tabootalks

http://135.181.26.183:80

Attributes
  • profile_id_v2

    00d92484c9b27bc8482a2cc94cacc508

Signatures

Files

  • 4092-1504-0x0000000000400000-0x000000000046C000-memory.dmp
    .exe windows x86


    Headers

    Sections