General

  • Target

    f4dfcb74fef5ac45f6eea3c8e40129e28b220b14819208bafa955b6e1585a5f1

  • Size

    576KB

  • Sample

    201112-bhrnx6yrms

  • MD5

    1c2e514e2725049532622f2da73c8a1b

  • SHA1

    202214f21d398212345a47e3b9684cbe91202dd7

  • SHA256

    f4dfcb74fef5ac45f6eea3c8e40129e28b220b14819208bafa955b6e1585a5f1

  • SHA512

    be1bc967cf2023d63c46d6c0625b99f3b8bb36842346f15fdb0ee85c83db67d288067570c84273e6fbc9e6f1d0b6c295780de3b63c8cd41f3d9bc721fa6f8e08

Malware Config

Targets

    • Target

      f4dfcb74fef5ac45f6eea3c8e40129e28b220b14819208bafa955b6e1585a5f1

    • Size

      576KB

    • MD5

      1c2e514e2725049532622f2da73c8a1b

    • SHA1

      202214f21d398212345a47e3b9684cbe91202dd7

    • SHA256

      f4dfcb74fef5ac45f6eea3c8e40129e28b220b14819208bafa955b6e1585a5f1

    • SHA512

      be1bc967cf2023d63c46d6c0625b99f3b8bb36842346f15fdb0ee85c83db67d288067570c84273e6fbc9e6f1d0b6c295780de3b63c8cd41f3d9bc721fa6f8e08

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks