General
-
Target
8564294725a57107809dbc67589a72adb4d256cddf8f05d6dd2d59b47ce96a9f
-
Size
622KB
-
Sample
220215-nvyehaffhq
-
MD5
4967cfc6d90cfbcc091d072f1cfc5a73
-
SHA1
46eaa2da395a1bd0cd5a5a4651789c4fd4bac067
-
SHA256
8564294725a57107809dbc67589a72adb4d256cddf8f05d6dd2d59b47ce96a9f
-
SHA512
2471ad09cfd84d4cf5af142eeff2fa82a7572f7bde3168295671589dc3457e173a5a8c10050c9f90d2d91a2b2556ea0024d6667ce33de4f4941820a3bf5035ff
Static task
static1
Behavioral task
behavioral1
Sample
8564294725a57107809dbc67589a72adb4d256cddf8f05d6dd2d59b47ce96a9f.exe
Resource
win7-en-20211208
Malware Config
Extracted
vidar
41.6
937
https://mas.to/@lilocc
-
profile_id
937
Targets
-
-
Target
8564294725a57107809dbc67589a72adb4d256cddf8f05d6dd2d59b47ce96a9f
-
Size
622KB
-
MD5
4967cfc6d90cfbcc091d072f1cfc5a73
-
SHA1
46eaa2da395a1bd0cd5a5a4651789c4fd4bac067
-
SHA256
8564294725a57107809dbc67589a72adb4d256cddf8f05d6dd2d59b47ce96a9f
-
SHA512
2471ad09cfd84d4cf5af142eeff2fa82a7572f7bde3168295671589dc3457e173a5a8c10050c9f90d2d91a2b2556ea0024d6667ce33de4f4941820a3bf5035ff
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-