General
-
Target
2880-391-0x0000000003DC0000-0x00000000040C0000-memory.dmp
-
Size
3.0MB
-
Sample
241118-mj1j2svdrq
-
MD5
fcf7be1649e81e679aa2973de2a0ae3b
-
SHA1
ef5a07e2ff62556d8837f3eb953613fb37ce8530
-
SHA256
235f1e611647b5395909d13c84dcb9f746714094472bf4b1a797d83156199690
-
SHA512
c080fa4d846088c488ada8c5776aa6268d5663ea6eec1411808fc8c717fd4d156e3bd016f09469fb19f8a1e8fcdd8238981f6898adc054d42301cf971207aba6
-
SSDEEP
6144:fLSq0YyhA6r9RbQ1JRnEm1nXtYGv1sYI8k1:fGeyh1Q5nEQXOGv1sYzk
Behavioral task
behavioral1
Sample
2880-391-0x0000000003DC0000-0x00000000040C0000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2880-391-0x0000000003DC0000-0x00000000040C0000-memory.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
vidar
11.4
f17b1459cafdd82d18339c316e706588
Targets
-
-
Target
2880-391-0x0000000003DC0000-0x00000000040C0000-memory.dmp
-
Size
3.0MB
-
MD5
fcf7be1649e81e679aa2973de2a0ae3b
-
SHA1
ef5a07e2ff62556d8837f3eb953613fb37ce8530
-
SHA256
235f1e611647b5395909d13c84dcb9f746714094472bf4b1a797d83156199690
-
SHA512
c080fa4d846088c488ada8c5776aa6268d5663ea6eec1411808fc8c717fd4d156e3bd016f09469fb19f8a1e8fcdd8238981f6898adc054d42301cf971207aba6
-
SSDEEP
6144:fLSq0YyhA6r9RbQ1JRnEm1nXtYGv1sYI8k1:fGeyh1Q5nEQXOGv1sYzk
-
Detect Vidar Stealer
-
Vidar family
-