General
-
Target
364b903484dd52bfd9b0dfacc6fcb7730ee3751cd3059a0d9a1f6feaa4f11740
-
Size
1.5MB
-
Sample
210926-zt2w3sfcek
-
MD5
bbcc8be905af74246d8c87a5addae059
-
SHA1
2db0ce1f8bc101d2154c5d09ee52f59923255cf5
-
SHA256
364b903484dd52bfd9b0dfacc6fcb7730ee3751cd3059a0d9a1f6feaa4f11740
-
SHA512
5ecef0b375ec80c8de03fe00cc1f3a23e6aec044e94b113053f37273b9bf367af40d2ddea1b1fd8636c6ff247d31dc16bf8eccc73ed4b5496509b0f563cad644
Static task
static1
Malware Config
Targets
-
-
Target
364b903484dd52bfd9b0dfacc6fcb7730ee3751cd3059a0d9a1f6feaa4f11740
-
Size
1.5MB
-
MD5
bbcc8be905af74246d8c87a5addae059
-
SHA1
2db0ce1f8bc101d2154c5d09ee52f59923255cf5
-
SHA256
364b903484dd52bfd9b0dfacc6fcb7730ee3751cd3059a0d9a1f6feaa4f11740
-
SHA512
5ecef0b375ec80c8de03fe00cc1f3a23e6aec044e94b113053f37273b9bf367af40d2ddea1b1fd8636c6ff247d31dc16bf8eccc73ed4b5496509b0f563cad644
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-