General
-
Target
49bcbb42223757d240ccd605c8befefcb38e92aaa87ce09fa0b26ea4a6d9fb34
-
Size
1.2MB
-
Sample
210814-wj1beezbve
-
MD5
0eb416a88971dab567b9c93816736010
-
SHA1
22bfe6efe4155283878fe3aff46b800ca9b6a3d1
-
SHA256
49bcbb42223757d240ccd605c8befefcb38e92aaa87ce09fa0b26ea4a6d9fb34
-
SHA512
24a30d480b068c0ebf8556d890cf27305697b7bd9f2f8d61bfd30ab046480d7cf537d429391e044183235507a5ba47562a89ae98806f068ee2747a275df6ec29
Static task
static1
Malware Config
Extracted
vidar
40
921
https://lenak513.tumblr.com/
-
profile_id
921
Targets
-
-
Target
49bcbb42223757d240ccd605c8befefcb38e92aaa87ce09fa0b26ea4a6d9fb34
-
Size
1.2MB
-
MD5
0eb416a88971dab567b9c93816736010
-
SHA1
22bfe6efe4155283878fe3aff46b800ca9b6a3d1
-
SHA256
49bcbb42223757d240ccd605c8befefcb38e92aaa87ce09fa0b26ea4a6d9fb34
-
SHA512
24a30d480b068c0ebf8556d890cf27305697b7bd9f2f8d61bfd30ab046480d7cf537d429391e044183235507a5ba47562a89ae98806f068ee2747a275df6ec29
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-