General
-
Target
2295510f041dc01c4a3c8644db06e1191c1b341d95c8104c44a62fac4544e44b
-
Size
756KB
-
Sample
220215-sc399agbf5
-
MD5
c047905ec2dbb9f688e5d14832679184
-
SHA1
c6574566b3ea0325f82eac22885320233fb40dce
-
SHA256
2295510f041dc01c4a3c8644db06e1191c1b341d95c8104c44a62fac4544e44b
-
SHA512
61f799e963a1cd1fce9f9997aff0644dde375bf5442aebacd03036301044c049436b35c4794e0d2e7fa742cf73a54efbfd26cbc66eb15ce0eecce97bd01338be
Static task
static1
Behavioral task
behavioral1
Sample
2295510f041dc01c4a3c8644db06e1191c1b341d95c8104c44a62fac4544e44b.exe
Resource
win7-en-20211208
Malware Config
Extracted
vidar
48.5
937
https://koyu.space/@tttaj
-
profile_id
937
Targets
-
-
Target
2295510f041dc01c4a3c8644db06e1191c1b341d95c8104c44a62fac4544e44b
-
Size
756KB
-
MD5
c047905ec2dbb9f688e5d14832679184
-
SHA1
c6574566b3ea0325f82eac22885320233fb40dce
-
SHA256
2295510f041dc01c4a3c8644db06e1191c1b341d95c8104c44a62fac4544e44b
-
SHA512
61f799e963a1cd1fce9f9997aff0644dde375bf5442aebacd03036301044c049436b35c4794e0d2e7fa742cf73a54efbfd26cbc66eb15ce0eecce97bd01338be
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Vidar Stealer
-