General
-
Target
812df939ca2fffa9ef8f9306707380c236710430e377744a367cf15420a3a8f6
-
Size
1.5MB
-
Sample
210926-m1b8saefdk
-
MD5
1375331a72565ac5cee34e620e256256
-
SHA1
4a0e0ba7c76602ba21bc8b1d6cc9991e62043558
-
SHA256
812df939ca2fffa9ef8f9306707380c236710430e377744a367cf15420a3a8f6
-
SHA512
f0def6f847ddcaff61b4e0a7db045da259fe9d5b6e5c9ad5949667857bd35fe80549783dfd6980ce5d94420a09a4e2311478ccdb4362698cd8b113895d3eb90a
Static task
static1
Malware Config
Targets
-
-
Target
812df939ca2fffa9ef8f9306707380c236710430e377744a367cf15420a3a8f6
-
Size
1.5MB
-
MD5
1375331a72565ac5cee34e620e256256
-
SHA1
4a0e0ba7c76602ba21bc8b1d6cc9991e62043558
-
SHA256
812df939ca2fffa9ef8f9306707380c236710430e377744a367cf15420a3a8f6
-
SHA512
f0def6f847ddcaff61b4e0a7db045da259fe9d5b6e5c9ad5949667857bd35fe80549783dfd6980ce5d94420a09a4e2311478ccdb4362698cd8b113895d3eb90a
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-