General

  • Target

    3144-135-0x0000000000400000-0x0000000000470000-memory.dmp

  • Size

    448KB

  • MD5

    c85b081cc9bcb7ac9e2b3b386d66df6b

  • SHA1

    9c787ac904f54a99a86db9b290f163cade1094db

  • SHA256

    122df57118b33ba01cf1891661855b15db20ab511d01ba2d6e4e37da92eb49e6

  • SHA512

    f65731efd10bbbe80fd22e7d8702e695f9fdf6510cb8884336d373e3aff910db5ea77b0b4250556f3d05066d8f3e60502b531721fe37b49e1135fcaae3c71d48

  • SSDEEP

    6144:0zzaqIZItMHsnePQwRi4Y5Werfqtc1D64PQ38zdLS/6UU3Ij6+:FZItcawk550c1D64PZVS/6z

Score
10/10

Malware Config

Extracted

Family

vidar

Version

2.6

Botnet

682

C2

https://t.me/robertotalks

https://steamcommunity.com/profiles/76561199480821604

http://95.217.157.160:80

Attributes
  • profile_id

    682

  • user_agent

    Mozilla/5.0 (X11; CrOS x86_64 14685.0.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.4992.0 Safari/537.36

Signatures

Files

  • 3144-135-0x0000000000400000-0x0000000000470000-memory.dmp
    .exe windows x86


    Headers

    Sections