General

  • Target

    4904-274-0x0000000000400000-0x000000000046C000-memory.dmp

  • Size

    432KB

  • MD5

    d2e52bfbc52680a4a4a51ef077955d05

  • SHA1

    d5b85043af529f63db70b4cabf97f998b4992a65

  • SHA256

    f2718cac5769aed2b3dc904fe670c2ba06f868bbc389cd44f9f13d65ef4b0a87

  • SHA512

    15320134aefe54ce108118ac24aee08ff7de0a140e8d7b35d73a4b0398a52ea8d8953c83282b16be0291f9260573494b84cb7c7c220066b0a5fb26f6d6945cf0

  • SSDEEP

    6144:cuQRHexo0nwlQvG4IyynVKzVKJ5/eRFHVmGim/9o0wVEhKh5Na:cuQRHexo0n24zVK32RRVmGiYwVbh/

Malware Config

Extracted

Family

vidar

Version

3.1

Botnet

00d92484c9b27bc8482a2cc94cacc508

C2

https://steamcommunity.com/profiles/76561199472266392

https://t.me/tabootalks

http://135.181.26.183:80

Attributes
  • profile_id_v2

    00d92484c9b27bc8482a2cc94cacc508

Signatures

Files

  • 4904-274-0x0000000000400000-0x000000000046C000-memory.dmp
    .exe windows x86


    Headers

    Sections