General
-
Target
53745473d4da93fdfa8e47ec0859cb54375832974f2b22c4c119e30f9cf3225e
-
Size
1.5MB
-
Sample
210926-3wsmzafdbl
-
MD5
cfa17828f51ebedba4d215c800296732
-
SHA1
90e2f0e1c8242c6edfb763beee3736f2d74c9f78
-
SHA256
53745473d4da93fdfa8e47ec0859cb54375832974f2b22c4c119e30f9cf3225e
-
SHA512
ffa05e2037d37c1ee89eac954d9a0569048e6f452bab9b49413624b1567e052537e676e5bd4f24dcd7ee7eac88bb873c78ec98d3344eea62254544eae11268c0
Static task
static1
Malware Config
Targets
-
-
Target
53745473d4da93fdfa8e47ec0859cb54375832974f2b22c4c119e30f9cf3225e
-
Size
1.5MB
-
MD5
cfa17828f51ebedba4d215c800296732
-
SHA1
90e2f0e1c8242c6edfb763beee3736f2d74c9f78
-
SHA256
53745473d4da93fdfa8e47ec0859cb54375832974f2b22c4c119e30f9cf3225e
-
SHA512
ffa05e2037d37c1ee89eac954d9a0569048e6f452bab9b49413624b1567e052537e676e5bd4f24dcd7ee7eac88bb873c78ec98d3344eea62254544eae11268c0
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-