General

  • Target

    1768-2-0x0000000000310000-0x0000000000422000-memory.dmp

  • Size

    1.1MB

  • MD5

    aef3b4be3753519e3140172832e2bc1e

  • SHA1

    b460a0873c8b14fe687a27b2ef85df48fd0ad0b9

  • SHA256

    f549c6b5a01042ffda5021836da25b400cbf21e94ad6b37a2b2ffa21f38dc095

  • SHA512

    af89dac7aa88ae8a43348fed6a3b962e163bb0a903ec85211f1485ce67e157c120604de6105179862227c489ccc4d0366182a5d09e3808ef0fceefd5d9f1a3c0

  • SSDEEP

    24576:dYgMp14Kc0zb3WbC0PdT5Ejl5LSp94ts:VM+0zb3WbC0P+W4ts

Score
10/10

Malware Config

Extracted

Family

vidar

Version

RoInitialize

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1768-2-0x0000000000310000-0x0000000000422000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections