General
-
Target
2496-0-0x0000000000400000-0x0000000000657000-memory.dmp
-
Size
2.3MB
-
Sample
241102-w315cssclr
-
MD5
4a46fae408fd7795232fa58937caa547
-
SHA1
52d9515fdcc42e1e2c385a9b98cf9b86334fdb15
-
SHA256
861f9dc1921e97844a04911d2c71a5c488be8c14e92635e1bf2533463ca1bf70
-
SHA512
087dc8fb05fa72534ff1cf4c03f628dd782f87a646976afdbe93c8aed35ebb1dbe519dc84f010537fe31269744a5bb0e3c6eadd7d73a4c6d5399b7fed48d6709
-
SSDEEP
3072:DP9MgUTtoTZ01GXNmI4c1xY7kl+cmZWEyCCfFix1NmDq0pCp8gyir9:DFMxKt5XNvzY7kI/CAjJ8k
Behavioral task
behavioral1
Sample
2496-0-0x0000000000400000-0x0000000000657000-memory.exe
Resource
win7-20241010-en
Malware Config
Extracted
vidar
0
Targets
-
-
Target
2496-0-0x0000000000400000-0x0000000000657000-memory.dmp
-
Size
2.3MB
-
MD5
4a46fae408fd7795232fa58937caa547
-
SHA1
52d9515fdcc42e1e2c385a9b98cf9b86334fdb15
-
SHA256
861f9dc1921e97844a04911d2c71a5c488be8c14e92635e1bf2533463ca1bf70
-
SHA512
087dc8fb05fa72534ff1cf4c03f628dd782f87a646976afdbe93c8aed35ebb1dbe519dc84f010537fe31269744a5bb0e3c6eadd7d73a4c6d5399b7fed48d6709
-
SSDEEP
3072:DP9MgUTtoTZ01GXNmI4c1xY7kl+cmZWEyCCfFix1NmDq0pCp8gyir9:DFMxKt5XNvzY7kI/CAjJ8k
-
Detect Vidar Stealer
-
Vidar family
-