General
-
Target
c29eb683b88cf85203b643c69c5736b30747ca174698633b63ef051ae751564e
-
Size
39KB
-
Sample
211126-lgbx8segf5
-
MD5
ef77956dda8366a03f902e2a16eae8e0
-
SHA1
3b0054c39e77ede35f068ed61627dc35cbbebf7f
-
SHA256
c29eb683b88cf85203b643c69c5736b30747ca174698633b63ef051ae751564e
-
SHA512
8bc3779d00d6b1e8de07c8a1ebaab140c46909738bf656f41fe5e85fe6aebe76726ba1cb2356e5a95c3bab7a71a3a8da41e8f97c34c96788c21f8eda5be937ad
Static task
static1
Malware Config
Extracted
vidar
48.7
1073
https://mstdn.social/@anapa
https://mastodon.social/@mniami
-
profile_id
1073
Targets
-
-
Target
c29eb683b88cf85203b643c69c5736b30747ca174698633b63ef051ae751564e
-
Size
39KB
-
MD5
ef77956dda8366a03f902e2a16eae8e0
-
SHA1
3b0054c39e77ede35f068ed61627dc35cbbebf7f
-
SHA256
c29eb683b88cf85203b643c69c5736b30747ca174698633b63ef051ae751564e
-
SHA512
8bc3779d00d6b1e8de07c8a1ebaab140c46909738bf656f41fe5e85fe6aebe76726ba1cb2356e5a95c3bab7a71a3a8da41e8f97c34c96788c21f8eda5be937ad
-
Vidar Stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-