General
-
Target
fa9cf0df3f912eb71ab7c15d6fcde93c65b950473a842b4bdaac31ba45fa84f2
-
Size
1.5MB
-
Sample
210926-zz9twafcer
-
MD5
0df01c1fdfcbbbd3b7b57cbe2c05c3f2
-
SHA1
8e8c6e4d1855686c234951a90451c2a20d2bbd58
-
SHA256
fa9cf0df3f912eb71ab7c15d6fcde93c65b950473a842b4bdaac31ba45fa84f2
-
SHA512
9e7ee27c2adac2b35d6fcc5c7545a09694afd37000338b289045def44f9ad3d18b77cf38bd2a98ff140226525d9a810d63bb53e6e97bf06c9e9520740927b557
Static task
static1
Malware Config
Targets
-
-
Target
fa9cf0df3f912eb71ab7c15d6fcde93c65b950473a842b4bdaac31ba45fa84f2
-
Size
1.5MB
-
MD5
0df01c1fdfcbbbd3b7b57cbe2c05c3f2
-
SHA1
8e8c6e4d1855686c234951a90451c2a20d2bbd58
-
SHA256
fa9cf0df3f912eb71ab7c15d6fcde93c65b950473a842b4bdaac31ba45fa84f2
-
SHA512
9e7ee27c2adac2b35d6fcc5c7545a09694afd37000338b289045def44f9ad3d18b77cf38bd2a98ff140226525d9a810d63bb53e6e97bf06c9e9520740927b557
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-