General

  • Target

    cee863800326b0ee3599568530ae5ed3ff1735550df9375845faf8ed26bd6c9b

  • Size

    597KB

  • Sample

    201113-xw39ejzs76

  • MD5

    486986b1121b2dff02f160216985a480

  • SHA1

    7d92b689a2892ad292fe332782c796181a31c23c

  • SHA256

    cee863800326b0ee3599568530ae5ed3ff1735550df9375845faf8ed26bd6c9b

  • SHA512

    74d9e592dc2836deeee59b4b79495a0d54e31182db10a3c26d687080d2c6a78455dad621d4f1bfb90ec38f938fc67ddcbf9c16329fbf1ba0a6c5cf9538d3530f

Malware Config

Targets

    • Target

      cee863800326b0ee3599568530ae5ed3ff1735550df9375845faf8ed26bd6c9b

    • Size

      597KB

    • MD5

      486986b1121b2dff02f160216985a480

    • SHA1

      7d92b689a2892ad292fe332782c796181a31c23c

    • SHA256

      cee863800326b0ee3599568530ae5ed3ff1735550df9375845faf8ed26bd6c9b

    • SHA512

      74d9e592dc2836deeee59b4b79495a0d54e31182db10a3c26d687080d2c6a78455dad621d4f1bfb90ec38f938fc67ddcbf9c16329fbf1ba0a6c5cf9538d3530f

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks