General

  • Target

    8279c5e334028729ac9f31a2c7d4d870

  • Size

    570KB

  • Sample

    201117-mnpb8b7pes

  • MD5

    6b9878e22bd56c19221d7f5a591aabc9

  • SHA1

    ebc33ea8e944af174626a4302371513d4182ab41

  • SHA256

    3d142a96b43d5698bfe9f57179bdd6d08b5e833ffccde209916a99a183a5dc6e

  • SHA512

    62035d433240aeda335f33bfb4b927e1645ec8214bc1e3e59f68347c3ef301e6a70867ed5a2582302b9c78dc513c5bc9013e37194ec850931d543178c3c0cf78

Malware Config

Targets

    • Target

      8279c5e334028729ac9f31a2c7d4d870

    • Size

      570KB

    • MD5

      6b9878e22bd56c19221d7f5a591aabc9

    • SHA1

      ebc33ea8e944af174626a4302371513d4182ab41

    • SHA256

      3d142a96b43d5698bfe9f57179bdd6d08b5e833ffccde209916a99a183a5dc6e

    • SHA512

      62035d433240aeda335f33bfb4b927e1645ec8214bc1e3e59f68347c3ef301e6a70867ed5a2582302b9c78dc513c5bc9013e37194ec850931d543178c3c0cf78

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks