General

  • Target

    375934af4c0a7978d0ecb0657556bae8de6384147cf722db689970ebc00729bf

  • Size

    583KB

  • Sample

    201115-qj2s2fgpyx

  • MD5

    afdfb08bd12c6cb9514d89f5674cebfa

  • SHA1

    5a104222d67b3439e365252cf782409de27faa0c

  • SHA256

    375934af4c0a7978d0ecb0657556bae8de6384147cf722db689970ebc00729bf

  • SHA512

    efd4af509009121e96c9ddbee874892c91e9ffbad79d06f2b07ae29e3d2094b393afcc7a04377b10fd7058c0132911b87159bd7c37c3c8fd718eb40bd93b42ca

Malware Config

Targets

    • Target

      375934af4c0a7978d0ecb0657556bae8de6384147cf722db689970ebc00729bf

    • Size

      583KB

    • MD5

      afdfb08bd12c6cb9514d89f5674cebfa

    • SHA1

      5a104222d67b3439e365252cf782409de27faa0c

    • SHA256

      375934af4c0a7978d0ecb0657556bae8de6384147cf722db689970ebc00729bf

    • SHA512

      efd4af509009121e96c9ddbee874892c91e9ffbad79d06f2b07ae29e3d2094b393afcc7a04377b10fd7058c0132911b87159bd7c37c3c8fd718eb40bd93b42ca

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks