General
-
Target
c1a313fe704f9b8c9fe815884a14309822744b4c4b2cf9e6d7f69bb644e9ac80
-
Size
1.5MB
-
Sample
210926-wynngafbcm
-
MD5
5e05fe3d853869afd78b2c795f5774a6
-
SHA1
f9dd24785117c17e858606a23da1d2995da3622c
-
SHA256
c1a313fe704f9b8c9fe815884a14309822744b4c4b2cf9e6d7f69bb644e9ac80
-
SHA512
4c7bba839cc3c8c35a2f630abd237073b09eb9fdf4ebde9d7da95048dc0002de1c770d1a49bf91fe71a157ef99e812928cf3cc212175de9120bf4214d30a0324
Static task
static1
Malware Config
Targets
-
-
Target
c1a313fe704f9b8c9fe815884a14309822744b4c4b2cf9e6d7f69bb644e9ac80
-
Size
1.5MB
-
MD5
5e05fe3d853869afd78b2c795f5774a6
-
SHA1
f9dd24785117c17e858606a23da1d2995da3622c
-
SHA256
c1a313fe704f9b8c9fe815884a14309822744b4c4b2cf9e6d7f69bb644e9ac80
-
SHA512
4c7bba839cc3c8c35a2f630abd237073b09eb9fdf4ebde9d7da95048dc0002de1c770d1a49bf91fe71a157ef99e812928cf3cc212175de9120bf4214d30a0324
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-