General

  • Target

    2000-54-0x00000000002C0000-0x0000000000331000-memory.dmp

  • Size

    452KB

  • MD5

    1a6d75c8f705862dd7ba3fb91da7e45f

  • SHA1

    7cdfe407237ba42911366d34988818e2b8fd3287

  • SHA256

    52fee26d3b2aae27521f2d0d12a44e66bc2165d5fbd3030c2eba6e961012d023

  • SHA512

    d772a9010fea367d10ae267b47a96166330088e7b1d2c143f89dbf1ff105a3c21d1370e920a8db622fdbad149c3f74f035867a92af1302c7557284cff5c75b76

  • SSDEEP

    6144:mWRs4oWoaMt877cGt4QWaNIpLaqRNI2ktUUTKxJ3fsFW:mqs4oFl8rt1ApLaqzl2e0FW

Malware Config

Extracted

Family

vidar

Version

3

Botnet

e37abeff0df24a473dacaf8467d6fa48

C2

https://t.me/zaskullz

https://steamcommunity.com/profiles/76561199486572327

http://135.181.87.234:80

Attributes
  • profile_id_v2

    e37abeff0df24a473dacaf8467d6fa48

Signatures

Files

  • 2000-54-0x00000000002C0000-0x0000000000331000-memory.dmp
    .exe windows x86


    Headers

    Sections