General
-
Target
8bbc17433814e1feb80c361de06a5db9
-
Size
873KB
-
Sample
231219-yq4e3abed2
-
MD5
8bbc17433814e1feb80c361de06a5db9
-
SHA1
1d3c273b2f4a8d53cdcd23100b8262f4e5df4650
-
SHA256
7cb5a78513c744a0e152d1bbac77df0157253eab90adbfdbc419a5c2f59662be
-
SHA512
365ef7b331bf3f653a74c2aba8b3afea5e680bedfcf3b3280a0328ad610b2859c7c57e5bfe5e6da8ec9dc9df085a3500d309b0a3d83f977f421af5e6da704c6e
-
SSDEEP
12288:cLxhqCrfU7SAVbjw5TkS/DhFYb2+56uiLuxMcSAZ1TjVpYX6fAZiQgeqdTAoa6mU:c1hHrg6/DjuieqAv9Qif1aI8OV
Static task
static1
Behavioral task
behavioral1
Sample
8bbc17433814e1feb80c361de06a5db9.exe
Resource
win7-20231215-en
Malware Config
Extracted
vidar
41.2
517
https://mas.to/@serg4325
-
profile_id
517
Targets
-
-
Target
8bbc17433814e1feb80c361de06a5db9
-
Size
873KB
-
MD5
8bbc17433814e1feb80c361de06a5db9
-
SHA1
1d3c273b2f4a8d53cdcd23100b8262f4e5df4650
-
SHA256
7cb5a78513c744a0e152d1bbac77df0157253eab90adbfdbc419a5c2f59662be
-
SHA512
365ef7b331bf3f653a74c2aba8b3afea5e680bedfcf3b3280a0328ad610b2859c7c57e5bfe5e6da8ec9dc9df085a3500d309b0a3d83f977f421af5e6da704c6e
-
SSDEEP
12288:cLxhqCrfU7SAVbjw5TkS/DhFYb2+56uiLuxMcSAZ1TjVpYX6fAZiQgeqdTAoa6mU:c1hHrg6/DjuieqAv9Qif1aI8OV
-
Vidar Stealer
-
Suspicious use of SetThreadContext
-