General

  • Target

    SecuriteInfo.com.Trojan.Siggen9.46595.26448.18380

  • Size

    596KB

  • Sample

    201109-l3japaw28s

  • MD5

    d96a6e169a28f21a650df026a6c4581a

  • SHA1

    e276a5fe3050c6666afcaad4f362d0eff3401172

  • SHA256

    e846df33b958032e9fbf264a3dafe63969a6682c1d9232d727d2f7d16d12a418

  • SHA512

    c24151ff8561dda61ee1d74fb6cfbf932f316c0a72f5446789431a7fe27310059e4220d26b5682564ac86533f3289719fabca39f0f400a4883b0a46dfdc0b7c1

Malware Config

Targets

    • Target

      SecuriteInfo.com.Trojan.Siggen9.46595.26448.18380

    • Size

      596KB

    • MD5

      d96a6e169a28f21a650df026a6c4581a

    • SHA1

      e276a5fe3050c6666afcaad4f362d0eff3401172

    • SHA256

      e846df33b958032e9fbf264a3dafe63969a6682c1d9232d727d2f7d16d12a418

    • SHA512

      c24151ff8561dda61ee1d74fb6cfbf932f316c0a72f5446789431a7fe27310059e4220d26b5682564ac86533f3289719fabca39f0f400a4883b0a46dfdc0b7c1

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks