General
-
Target
c0afe7cb620b58842c9ec120442b921b1eb93943cbea2e260a1d17da44b4afa0
-
Size
1.5MB
-
Sample
210926-vvsycafbf7
-
MD5
b2912cb6988dc952a942a53c3b2839fd
-
SHA1
1ff3669c58e74f2b585a55bfcfa15da943c557b6
-
SHA256
c0afe7cb620b58842c9ec120442b921b1eb93943cbea2e260a1d17da44b4afa0
-
SHA512
1631017862c2e5be369c126db72ee9fbdb980771852aab85defa2ccdefbbdd8b3d097fc011bc710a81f5a7213a4b0d364de4d412ae18530bfafcd9a8a45d7be4
Static task
static1
Malware Config
Targets
-
-
Target
c0afe7cb620b58842c9ec120442b921b1eb93943cbea2e260a1d17da44b4afa0
-
Size
1.5MB
-
MD5
b2912cb6988dc952a942a53c3b2839fd
-
SHA1
1ff3669c58e74f2b585a55bfcfa15da943c557b6
-
SHA256
c0afe7cb620b58842c9ec120442b921b1eb93943cbea2e260a1d17da44b4afa0
-
SHA512
1631017862c2e5be369c126db72ee9fbdb980771852aab85defa2ccdefbbdd8b3d097fc011bc710a81f5a7213a4b0d364de4d412ae18530bfafcd9a8a45d7be4
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-