General
-
Target
e19e5702b706ca6a9508d67a44379aaef9361111dcdcd99c65fac6e027534fa7
-
Size
721KB
-
Sample
220215-f2b6vacfcr
-
MD5
5aae43957aac87119b0c3b3f75238f5f
-
SHA1
6c3d927fb44f0afab6b8ab0130e47ba0b143f8b6
-
SHA256
e19e5702b706ca6a9508d67a44379aaef9361111dcdcd99c65fac6e027534fa7
-
SHA512
29775313ba24ce6c79f7f35ff3e71664211fea86887947307774bf9113acd6a0bbe2c69f86bf379cf6aac41746098e9002e77aaf61983157088e48528979ff34
Static task
static1
Behavioral task
behavioral1
Sample
e19e5702b706ca6a9508d67a44379aaef9361111dcdcd99c65fac6e027534fa7.exe
Resource
win7-en-20211208
Malware Config
Extracted
vidar
47.8
937
https://mas.to/@romashkin
-
profile_id
937
Targets
-
-
Target
e19e5702b706ca6a9508d67a44379aaef9361111dcdcd99c65fac6e027534fa7
-
Size
721KB
-
MD5
5aae43957aac87119b0c3b3f75238f5f
-
SHA1
6c3d927fb44f0afab6b8ab0130e47ba0b143f8b6
-
SHA256
e19e5702b706ca6a9508d67a44379aaef9361111dcdcd99c65fac6e027534fa7
-
SHA512
29775313ba24ce6c79f7f35ff3e71664211fea86887947307774bf9113acd6a0bbe2c69f86bf379cf6aac41746098e9002e77aaf61983157088e48528979ff34
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-