General
-
Target
27899cff9d0fdc8cb90a367d62d00d0152498a46c5974564279deb09544da658
-
Size
1.5MB
-
Sample
210926-zabksafcck
-
MD5
f43f57e3d3303c16d464d1ada89318a0
-
SHA1
38505fe544322f23f57166286a594ad32d36ddd4
-
SHA256
27899cff9d0fdc8cb90a367d62d00d0152498a46c5974564279deb09544da658
-
SHA512
67ff6587d1ff8411f79126f44dc42c999fbca33c3a47f9452976b12dd0b40f2eb57f71ad7e4859904fa7e45e486da2f07c498d6ef7e6be0f7b3a3d644ebcb344
Static task
static1
Malware Config
Targets
-
-
Target
27899cff9d0fdc8cb90a367d62d00d0152498a46c5974564279deb09544da658
-
Size
1.5MB
-
MD5
f43f57e3d3303c16d464d1ada89318a0
-
SHA1
38505fe544322f23f57166286a594ad32d36ddd4
-
SHA256
27899cff9d0fdc8cb90a367d62d00d0152498a46c5974564279deb09544da658
-
SHA512
67ff6587d1ff8411f79126f44dc42c999fbca33c3a47f9452976b12dd0b40f2eb57f71ad7e4859904fa7e45e486da2f07c498d6ef7e6be0f7b3a3d644ebcb344
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-