General

  • Target

    5040-1-0x00000000006B0000-0x00000000007C2000-memory.dmp

  • Size

    1.1MB

  • MD5

    7b0afeea58abdf10344de15f40661a56

  • SHA1

    0712e1e3505fe36c380e7cc5d60ec7b1e67e785f

  • SHA256

    d13908a0fb544157d67089537f2671d001d323c1bd7b9001f83365b41c302cc1

  • SHA512

    977594f81313851b816377b0b0532565bc7a51f7201f63d5f1cac15a0edce6d8c34c741fa6922837f94aac8f517d1243a245173283a50b7ff24d554923901e18

  • SSDEEP

    24576:Qssshfmckytr1+3wgHzFT7Ejn5LSp94t9:Oswytr1+3wMziW4t9

Score
10/10

Malware Config

Extracted

Family

vidar

Version

RoInitialize

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5040-1-0x00000000006B0000-0x00000000007C2000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections