General

  • Target

    576-204-0x0000000000400000-0x000000000046C000-memory.dmp

  • Size

    432KB

  • MD5

    6f41b8a7d8c4f3684148046b8deed61e

  • SHA1

    3db40bde8e306211c161510fb2f412f44de32b7c

  • SHA256

    f603f984092107aeed0e3fbfbacca489bb8cc38cdb411ac79acad1f1d0273cbb

  • SHA512

    d56c80fcde3ffee5f135859441aaee8860ad9126a2a1b3152815195a1e549ea3afc94477c70405852304c01b4a3f1987f0ac19d22a30733af040068afed8db7f

  • SSDEEP

    6144:cuQRHexo0nwlQvG4IyynVKzVKJ5/eRFHVmGi0/9o0wVEhKhGua:cuQRHexo0n24zVK32RRVmGi2wVbhx

Malware Config

Extracted

Family

vidar

Version

3.1

Botnet

00d92484c9b27bc8482a2cc94cacc508

C2

https://steamcommunity.com/profiles/76561199472266392

https://t.me/tabootalks

http://135.181.26.183:80

Attributes
  • profile_id_v2

    00d92484c9b27bc8482a2cc94cacc508

Signatures

Files

  • 576-204-0x0000000000400000-0x000000000046C000-memory.dmp
    .exe windows x86


    Headers

    Sections