General

  • Target

    231755c24543678a23b56f691cbcbb74.exe

  • Size

    507KB

  • Sample

    210116-dz7rlz936s

  • MD5

    231755c24543678a23b56f691cbcbb74

  • SHA1

    9c477c8463c0cceccf766579579053d607b8a3d2

  • SHA256

    ba5fe55020976c1a1f5138dc0d533b786317f32cff2b1b05a473ce2f3f9eeb3a

  • SHA512

    c3117ef384ddf270d60a9630648f70504b70e0bc536a2dc03adfc7bd635ca74db15c0747d3d6135b5f8fd23d6862708cdca2bd08d0ebabaa6847d7ef11bfc69d

Malware Config

Targets

    • Target

      231755c24543678a23b56f691cbcbb74.exe

    • Size

      507KB

    • MD5

      231755c24543678a23b56f691cbcbb74

    • SHA1

      9c477c8463c0cceccf766579579053d607b8a3d2

    • SHA256

      ba5fe55020976c1a1f5138dc0d533b786317f32cff2b1b05a473ce2f3f9eeb3a

    • SHA512

      c3117ef384ddf270d60a9630648f70504b70e0bc536a2dc03adfc7bd635ca74db15c0747d3d6135b5f8fd23d6862708cdca2bd08d0ebabaa6847d7ef11bfc69d

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks