General
-
Target
228-224-0x00000000004B0000-0x000000000051D000-memory.dmp
-
Size
436KB
-
Sample
230323-y1gztahh65
-
MD5
8781d2c33ef21eba723ee3f584fa9d31
-
SHA1
e5d76b5ec52fbe609ae01c03d6a26ea2f518e164
-
SHA256
bb9991168e73d376ad7827fd03a5a8f9cd1c0855094271867437546909a37582
-
SHA512
f663f77166fca433c5972c17ad810d1fa42a846a775cf70d4108831721a2cca8c1ae7cfe882826cdaa56a070e16278dce3bec550f76839775cefd978007d4226
-
SSDEEP
6144:Az9exemcYskmQKD3MnCMrbDgzcyj0CFG/9olEBkh1rIiOJZ:Az9exmYeQZCMrbcztj0CF5EBSInZ
Behavioral task
behavioral1
Sample
228-224-0x00000000004B0000-0x000000000051D000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
228-224-0x00000000004B0000-0x000000000051D000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
vidar
3.1
ba1fc89d9f7df84dadf34886aabb246c
https://t.me/owned001
http://65.109.236.2:80
https://t.me/tabootalks
https://steamcommunity.com/profiles/76561199472266392
http://135.181.26.183:80
-
profile_id_v2
ba1fc89d9f7df84dadf34886aabb246c
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 OPR/91.0.4516.79
Targets
-
-
Target
228-224-0x00000000004B0000-0x000000000051D000-memory.dmp
-
Size
436KB
-
MD5
8781d2c33ef21eba723ee3f584fa9d31
-
SHA1
e5d76b5ec52fbe609ae01c03d6a26ea2f518e164
-
SHA256
bb9991168e73d376ad7827fd03a5a8f9cd1c0855094271867437546909a37582
-
SHA512
f663f77166fca433c5972c17ad810d1fa42a846a775cf70d4108831721a2cca8c1ae7cfe882826cdaa56a070e16278dce3bec550f76839775cefd978007d4226
-
SSDEEP
6144:Az9exemcYskmQKD3MnCMrbDgzcyj0CFG/9olEBkh1rIiOJZ:Az9exmYeQZCMrbcztj0CF5EBSInZ
Score3/10 -