General
-
Target
d5630b0bd4a32f7f0494ff146ff149d45cbce7fcd994463733e2fc67c2a17089
-
Size
1.5MB
-
Sample
210923-pc5arsedd4
-
MD5
cb88ac312cbb52b9e38a6faf88adc5d4
-
SHA1
077f5657e9291c4d718953501f9d4203a5c60365
-
SHA256
d5630b0bd4a32f7f0494ff146ff149d45cbce7fcd994463733e2fc67c2a17089
-
SHA512
22ecdcf215500589e7cb5ccc96cae99140cd20410dd8aef3035298a7e006e6fddd58a7404d8dcd8fd72725186d1de326d21a06152d314180804d5685f778ba40
Static task
static1
Malware Config
Extracted
vidar
41
1013
https://mas.to/@killern0
-
profile_id
1013
Targets
-
-
Target
d5630b0bd4a32f7f0494ff146ff149d45cbce7fcd994463733e2fc67c2a17089
-
Size
1.5MB
-
MD5
cb88ac312cbb52b9e38a6faf88adc5d4
-
SHA1
077f5657e9291c4d718953501f9d4203a5c60365
-
SHA256
d5630b0bd4a32f7f0494ff146ff149d45cbce7fcd994463733e2fc67c2a17089
-
SHA512
22ecdcf215500589e7cb5ccc96cae99140cd20410dd8aef3035298a7e006e6fddd58a7404d8dcd8fd72725186d1de326d21a06152d314180804d5685f778ba40
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-