General

  • Target

    4ef8ca1609ef52a9a30bcc7e87083b55.exe

  • Size

    681KB

  • Sample

    201109-8yawb2pbla

  • MD5

    4ef8ca1609ef52a9a30bcc7e87083b55

  • SHA1

    d2f204852ab8b8d19288eef03549c87cfb9fbda9

  • SHA256

    aa0391688fb348eaa32856bcf0caca596177985f4dd9733f69ab2018ba8d1ff7

  • SHA512

    991ad0bf136825f3c46a748aca349a4a0dd007fe0b72aaff631978f2a2682d8aa12457f7c6df20733dedad919b4606b1c0731a413c75be51289a2f4896c2ec4a

Malware Config

Targets

    • Target

      4ef8ca1609ef52a9a30bcc7e87083b55.exe

    • Size

      681KB

    • MD5

      4ef8ca1609ef52a9a30bcc7e87083b55

    • SHA1

      d2f204852ab8b8d19288eef03549c87cfb9fbda9

    • SHA256

      aa0391688fb348eaa32856bcf0caca596177985f4dd9733f69ab2018ba8d1ff7

    • SHA512

      991ad0bf136825f3c46a748aca349a4a0dd007fe0b72aaff631978f2a2682d8aa12457f7c6df20733dedad919b4606b1c0731a413c75be51289a2f4896c2ec4a

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Tasks