General

  • Target

    3c1b51581b897869c589290fcabe72d0.exe

  • Size

    706KB

  • Sample

    200629-qgp1cy6age

  • MD5

    3c1b51581b897869c589290fcabe72d0

  • SHA1

    fd8f86a0d94288a0b73a3ec1fd1674ebcac37ee8

  • SHA256

    470f7e4b374c37aeb60ce012b83d1da04899dbeda81f6a1799aadefc7789f5e6

  • SHA512

    711bd45dbae2160eb7ccb02007234f58d0d866a590c325f5aeb9d12ec00808d8e3da83ba10a1f5a6fa957a17dfc36be17548865b0981744446323f0f77d3b285

Score
10/10

Malware Config

Targets

    • Target

      3c1b51581b897869c589290fcabe72d0.exe

    • Size

      706KB

    • MD5

      3c1b51581b897869c589290fcabe72d0

    • SHA1

      fd8f86a0d94288a0b73a3ec1fd1674ebcac37ee8

    • SHA256

      470f7e4b374c37aeb60ce012b83d1da04899dbeda81f6a1799aadefc7789f5e6

    • SHA512

      711bd45dbae2160eb7ccb02007234f58d0d866a590c325f5aeb9d12ec00808d8e3da83ba10a1f5a6fa957a17dfc36be17548865b0981744446323f0f77d3b285

    Score
    10/10
    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Tasks