General

  • Target

    0c5fb9fbae4bb14ba16c82514131bdd1cb5b94401c4446e346a320be7f642070

  • Size

    570KB

  • Sample

    201115-3l8j6spxfj

  • MD5

    2415e04b5cc88a154688aa41b0337282

  • SHA1

    2998370c87f5ad0108c753518cd22b2bc79da947

  • SHA256

    0c5fb9fbae4bb14ba16c82514131bdd1cb5b94401c4446e346a320be7f642070

  • SHA512

    529f1b0310b864ebfc9d57c1c306b4f0565221f3ecbdd881f511033b0a73820de711ac70b33d1b07a126ac3024b8aac2270977bcd31f8ee44dfbc756039a13d6

Malware Config

Targets

    • Target

      0c5fb9fbae4bb14ba16c82514131bdd1cb5b94401c4446e346a320be7f642070

    • Size

      570KB

    • MD5

      2415e04b5cc88a154688aa41b0337282

    • SHA1

      2998370c87f5ad0108c753518cd22b2bc79da947

    • SHA256

      0c5fb9fbae4bb14ba16c82514131bdd1cb5b94401c4446e346a320be7f642070

    • SHA512

      529f1b0310b864ebfc9d57c1c306b4f0565221f3ecbdd881f511033b0a73820de711ac70b33d1b07a126ac3024b8aac2270977bcd31f8ee44dfbc756039a13d6

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks