General
-
Target
f0b88dae1dbd6a46397bdc564648e19cc6d45af5d0288222f9ace17e92193941
-
Size
2.0MB
-
Sample
220320-cg9d3aefe3
-
MD5
249b481f803df7bd193f311c181f655e
-
SHA1
a2d957d04c8d4754b3c31cd7941b39fe543f8104
-
SHA256
f0b88dae1dbd6a46397bdc564648e19cc6d45af5d0288222f9ace17e92193941
-
SHA512
182f4a1baf87bcf0ef443e7e5d43f12e5fe0b762f81e5fea5a0850900376718ef8be221b39d47e19134c6a4a63fcbc75ef092c14723d4cb2ee15e9dcba688435
Static task
static1
Behavioral task
behavioral1
Sample
f0b88dae1dbd6a46397bdc564648e19cc6d45af5d0288222f9ace17e92193941.exe
Resource
win7-20220310-en
Malware Config
Extracted
vidar
35.1
399
http://syrusim.com/
-
profile_id
399
Targets
-
-
Target
f0b88dae1dbd6a46397bdc564648e19cc6d45af5d0288222f9ace17e92193941
-
Size
2.0MB
-
MD5
249b481f803df7bd193f311c181f655e
-
SHA1
a2d957d04c8d4754b3c31cd7941b39fe543f8104
-
SHA256
f0b88dae1dbd6a46397bdc564648e19cc6d45af5d0288222f9ace17e92193941
-
SHA512
182f4a1baf87bcf0ef443e7e5d43f12e5fe0b762f81e5fea5a0850900376718ef8be221b39d47e19134c6a4a63fcbc75ef092c14723d4cb2ee15e9dcba688435
-
Vidar Stealer
-
Suspicious use of SetThreadContext
-