General

  • Target

    0cb127e5ec9973374bf7da9419d05531c1309795ad9b6bd439f340ffe6758664

  • Size

    519KB

  • Sample

    201113-f8l92xhkce

  • MD5

    91d8145701fa8016e22acb6027d92217

  • SHA1

    7c7a1d1ff327c914bc4b2cb838b62bf827361f0d

  • SHA256

    0cb127e5ec9973374bf7da9419d05531c1309795ad9b6bd439f340ffe6758664

  • SHA512

    46fe5e10355ce2cb9fedec0f477dc645c576def8af177b7fe812c96e674ecbd492c67e6c5c6de6b6f502e3b044b07f456ab9a2cfd3a6c5e416be4ae7961dc75a

Malware Config

Targets

    • Target

      0cb127e5ec9973374bf7da9419d05531c1309795ad9b6bd439f340ffe6758664

    • Size

      519KB

    • MD5

      91d8145701fa8016e22acb6027d92217

    • SHA1

      7c7a1d1ff327c914bc4b2cb838b62bf827361f0d

    • SHA256

      0cb127e5ec9973374bf7da9419d05531c1309795ad9b6bd439f340ffe6758664

    • SHA512

      46fe5e10355ce2cb9fedec0f477dc645c576def8af177b7fe812c96e674ecbd492c67e6c5c6de6b6f502e3b044b07f456ab9a2cfd3a6c5e416be4ae7961dc75a

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks