General
-
Target
5c4509c557926d518045766f86de310d9ced00683d375a80583b3782a74f4b35
-
Size
1.5MB
-
Sample
210926-swhsnaehhr
-
MD5
e76aa0cbbb2ee3b275ac7dbd99ffd5fe
-
SHA1
f3b4f40cb78d4006db3fe3f3cb96e096eab52787
-
SHA256
5c4509c557926d518045766f86de310d9ced00683d375a80583b3782a74f4b35
-
SHA512
309470fcb7d82e2e4f0cd5b02b52a4050b4b6339be94e8c040778f4b485e5eed51fadbc82d98137734b50edcb3f4a7c422195eb1ef6330e52e914df3c4863a9c
Static task
static1
Malware Config
Targets
-
-
Target
5c4509c557926d518045766f86de310d9ced00683d375a80583b3782a74f4b35
-
Size
1.5MB
-
MD5
e76aa0cbbb2ee3b275ac7dbd99ffd5fe
-
SHA1
f3b4f40cb78d4006db3fe3f3cb96e096eab52787
-
SHA256
5c4509c557926d518045766f86de310d9ced00683d375a80583b3782a74f4b35
-
SHA512
309470fcb7d82e2e4f0cd5b02b52a4050b4b6339be94e8c040778f4b485e5eed51fadbc82d98137734b50edcb3f4a7c422195eb1ef6330e52e914df3c4863a9c
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-