General

  • Target

    6743a342503883790f26d292d77f9586.exe

  • Size

    518KB

  • Sample

    201109-lzaj6znx8a

  • MD5

    6743a342503883790f26d292d77f9586

  • SHA1

    f8d84093978a4ae563523214273807b10b742053

  • SHA256

    399712e038d1abc2f9df1c4786f75f3778549068262a8e149837338b25779e82

  • SHA512

    b53c6625d0c30b65ccd7d6748f622bccbd9c04d693339f1c8cee79712bff41b7cb678f70746e9e485cb5f59de940b44f35df41ecfd94f29ba3a6310945738086

Malware Config

Targets

    • Target

      6743a342503883790f26d292d77f9586.exe

    • Size

      518KB

    • MD5

      6743a342503883790f26d292d77f9586

    • SHA1

      f8d84093978a4ae563523214273807b10b742053

    • SHA256

      399712e038d1abc2f9df1c4786f75f3778549068262a8e149837338b25779e82

    • SHA512

      b53c6625d0c30b65ccd7d6748f622bccbd9c04d693339f1c8cee79712bff41b7cb678f70746e9e485cb5f59de940b44f35df41ecfd94f29ba3a6310945738086

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks