General

  • Target

    4960-274-0x0000000000400000-0x000000000046C000-memory.dmp

  • Size

    432KB

  • MD5

    4ea35920aa487c92eeebf3211f402d07

  • SHA1

    d9245080ba2ba9eabc9a18b4c3ec9887db898946

  • SHA256

    b9b624c49ea14ae2537b3b942004f6a00c4277d109364392a7e80c73bf0ec51a

  • SHA512

    08f6bb47081d9502abb3d8aa08e0e8ebcab1d14ce2f100a13cbaf09c96035ba194266ce020ac730842b619f1fb02848aa3c72c43607e3c6467ecb15538004574

  • SSDEEP

    6144:cuQRHexo0nwlQvG4IyynVKzVKJ5/eRFHVmGiw/9o0wVEhKhhLa:cuQRHexo0n24zVK32RRVmGiCwVbh9

Malware Config

Extracted

Family

vidar

Version

3.1

Botnet

00d92484c9b27bc8482a2cc94cacc508

C2

https://steamcommunity.com/profiles/76561199472266392

https://t.me/tabootalks

http://135.181.26.183:80

Attributes
  • profile_id_v2

    00d92484c9b27bc8482a2cc94cacc508

Signatures

Files

  • 4960-274-0x0000000000400000-0x000000000046C000-memory.dmp
    .exe windows x86


    Headers

    Sections