General

  • Target

    050cd5573a279f7d12ca09dc4f45b01878eaee99174beb04e4126fcfc16d5286

  • Size

    583KB

  • Sample

    201112-lfka684kxn

  • MD5

    07c44b0a50366075bd4bc7589f42d715

  • SHA1

    69ace85bfd5e9fbd94089a231b2764aed663092e

  • SHA256

    050cd5573a279f7d12ca09dc4f45b01878eaee99174beb04e4126fcfc16d5286

  • SHA512

    92edb09bc1b861af2baded74c4837e34aaf1f105264d77dc597e07ea4782ac6cf114a600103688218938ba2f9775a5cf0973aa1054b3a51e6292671397c333fb

Malware Config

Targets

    • Target

      050cd5573a279f7d12ca09dc4f45b01878eaee99174beb04e4126fcfc16d5286

    • Size

      583KB

    • MD5

      07c44b0a50366075bd4bc7589f42d715

    • SHA1

      69ace85bfd5e9fbd94089a231b2764aed663092e

    • SHA256

      050cd5573a279f7d12ca09dc4f45b01878eaee99174beb04e4126fcfc16d5286

    • SHA512

      92edb09bc1b861af2baded74c4837e34aaf1f105264d77dc597e07ea4782ac6cf114a600103688218938ba2f9775a5cf0973aa1054b3a51e6292671397c333fb

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks