General
-
Target
226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad
-
Size
2.1MB
-
Sample
220612-fzav1afhbl
-
MD5
23456ad6c1674099ea46af2c39aea29b
-
SHA1
a017e8ba079165d82d3398a83b3f057c7edb4b0e
-
SHA256
226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad
-
SHA512
f5554062802097c67f1a80d428647821e87729ecd7e4eee075d54262a27e79b6fbaf274ba79d21b8aa7c3a982ba2943a7f397fe20eacf5cddd872ac4df500e7f
Static task
static1
Behavioral task
behavioral1
Sample
226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad.exe
Resource
win7-20220414-en
Malware Config
Extracted
vidar
50.1
1120
https://mastodon.online/@k1llerniax
https://koyu.space/@k1llerni2x
-
profile_id
1120
Targets
-
-
Target
226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad
-
Size
2.1MB
-
MD5
23456ad6c1674099ea46af2c39aea29b
-
SHA1
a017e8ba079165d82d3398a83b3f057c7edb4b0e
-
SHA256
226a8293b96709284b0a726013df26047ff8d4837a337a89dc810d4ce7800fad
-
SHA512
f5554062802097c67f1a80d428647821e87729ecd7e4eee075d54262a27e79b6fbaf274ba79d21b8aa7c3a982ba2943a7f397fe20eacf5cddd872ac4df500e7f
-
Vidar Stealer
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-