General

  • Target

    CryptOne_Exec_bafd67655881338781812220378d512f026eeaa1362a73317c501585b037cee8.bin

  • Size

    849KB

  • MD5

    925c2c293756905cfbbcd7dcabe2e422

  • SHA1

    565ed5eea7f747a05265b06fae49d5e3de9235c8

  • SHA256

    c08e9b44352d823f8a127918f362bd87863daa6f8efddd744da433679e0f4748

  • SHA512

    01c99d16304a9f62014814c4e0beb4fb6553f5d052ef2e521063f015ae274da8b789b4323dae6037644cb298e410fa1a30f9c993c7d6d52401ad09102e566e38

  • SSDEEP

    24576:Oj1mUhVzjbzQsimZZBohglclfpKr20leNttt:OpmojBZZBxuVz0sbtt

Score
10/10

Malware Config

Extracted

Family

vidar

Version

47.8

Botnet

869

C2

https://mas.to/@romashkin

Attributes
  • profile_id

    869

Signatures

  • Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • CryptOne_Exec_bafd67655881338781812220378d512f026eeaa1362a73317c501585b037cee8.bin
    .exe windows x86

    3fea40ded92aafea7f0a1fde4b96095c


    Headers

    Imports

    Sections