General

  • Target

    2852-40-0x0000000003870000-0x0000000003AE6000-memory.dmp

  • Size

    2.5MB

  • Sample

    240926-gc6jtstcla

  • MD5

    6f29238fa6f1771031f2acd2340b4c4c

  • SHA1

    206fb7b440d0dffe8b974667e02df7ca8d1898a6

  • SHA256

    563a1f53e76d3edfc07c7f58c2c6dde089687d18deed1aec4cee829bde0fd389

  • SHA512

    8d57bc9dfba1aaf1c4da4f550df6e835ed1451f21c243ebbf352423bb394af85981c67b4e4c4685c1038e632bbd4ae178067a9225a7d033a55904ff205ffb76f

  • SSDEEP

    3072:EulT2PUeGyKpKJmdhzMJGydGcB00NVlbPaNEQyHDq0omp8Hra9s:zlqPvKpKJNJGyRlpeS8a

Malware Config

Extracted

Family

vidar

Version

11

Botnet

dc012f980711fe846b1fec1f4b705f4a

Targets

    • Target

      2852-40-0x0000000003870000-0x0000000003AE6000-memory.dmp

    • Size

      2.5MB

    • MD5

      6f29238fa6f1771031f2acd2340b4c4c

    • SHA1

      206fb7b440d0dffe8b974667e02df7ca8d1898a6

    • SHA256

      563a1f53e76d3edfc07c7f58c2c6dde089687d18deed1aec4cee829bde0fd389

    • SHA512

      8d57bc9dfba1aaf1c4da4f550df6e835ed1451f21c243ebbf352423bb394af85981c67b4e4c4685c1038e632bbd4ae178067a9225a7d033a55904ff205ffb76f

    • SSDEEP

      3072:EulT2PUeGyKpKJmdhzMJGydGcB00NVlbPaNEQyHDq0omp8Hra9s:zlqPvKpKJNJGyRlpeS8a

MITRE ATT&CK Enterprise v15

Tasks