General
-
Target
1052-40-0x0000000005FF0000-0x0000000006266000-memory.dmp
-
Size
2.5MB
-
Sample
241007-q9g26ssdqe
-
MD5
92d5e5cca138d7660ab2c256f712b58d
-
SHA1
9cad2e2dadcde1857c1afac157d45b9248380e7e
-
SHA256
3be2161479d986eca564596bdc208930a7154acd66e50cc8618567ff486528b2
-
SHA512
bb18272a44dba86a85494e3384adf14c54fcad47968f0ad2c8878c1a5d13176d292472aa2bdb7077a22a109887d505b7fdcdf95800727a34ba35bcca9fe70635
-
SSDEEP
3072:XulT2PUeGyKpKJmdhzMJGydGcB00NVlbPaNEQytXq0oUlp8Hra9s:elqPvKpKJNJGyRl6If8a
Behavioral task
behavioral1
Sample
1052-40-0x0000000005FF0000-0x0000000006266000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1052-40-0x0000000005FF0000-0x0000000006266000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
11
744fd163d6d4e0ac37e4032bcbfbb6af
Targets
-
-
Target
1052-40-0x0000000005FF0000-0x0000000006266000-memory.dmp
-
Size
2.5MB
-
MD5
92d5e5cca138d7660ab2c256f712b58d
-
SHA1
9cad2e2dadcde1857c1afac157d45b9248380e7e
-
SHA256
3be2161479d986eca564596bdc208930a7154acd66e50cc8618567ff486528b2
-
SHA512
bb18272a44dba86a85494e3384adf14c54fcad47968f0ad2c8878c1a5d13176d292472aa2bdb7077a22a109887d505b7fdcdf95800727a34ba35bcca9fe70635
-
SSDEEP
3072:XulT2PUeGyKpKJmdhzMJGydGcB00NVlbPaNEQytXq0oUlp8Hra9s:elqPvKpKJNJGyRl6If8a
-
Detect Vidar Stealer
-