General
-
Target
9ccb20351726e5bd48b82434c8ca3f88c655cf0a56f538887aaee78fb342fac5
-
Size
1.5MB
-
Sample
210926-xvzr1afbfq
-
MD5
3f5d81bfec6b0be4367e35874abecdc0
-
SHA1
7d3f2436701fc443287fc2d3509e1cbb650df734
-
SHA256
9ccb20351726e5bd48b82434c8ca3f88c655cf0a56f538887aaee78fb342fac5
-
SHA512
1e03da303bcfd03f7fdd71103c9a3b12996a095b66790b16dd1cb14f74d876796701fd9ce7c1343b02b029a58f90e81111f835ad8ae5a09f602fc9f98bb858ae
Static task
static1
Malware Config
Targets
-
-
Target
9ccb20351726e5bd48b82434c8ca3f88c655cf0a56f538887aaee78fb342fac5
-
Size
1.5MB
-
MD5
3f5d81bfec6b0be4367e35874abecdc0
-
SHA1
7d3f2436701fc443287fc2d3509e1cbb650df734
-
SHA256
9ccb20351726e5bd48b82434c8ca3f88c655cf0a56f538887aaee78fb342fac5
-
SHA512
1e03da303bcfd03f7fdd71103c9a3b12996a095b66790b16dd1cb14f74d876796701fd9ce7c1343b02b029a58f90e81111f835ad8ae5a09f602fc9f98bb858ae
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-