General

  • Target

    14c352be7111714a07714ab82bfd1b70.exe

  • Size

    544KB

  • Sample

    210117-6wfxc2pa72

  • MD5

    14c352be7111714a07714ab82bfd1b70

  • SHA1

    3db41efadf56deafeff3ac541ea68c0046843e47

  • SHA256

    1b7bc78836c832c48b86f5c5406741018af99062461b8f4f2f9e55c8fcc076fc

  • SHA512

    45e15889a6d44891755aaa7de5abced9ea1cd5fdb91d2e284430c65647e136ca5a3b246b7a9ff14fbaf0a2d857e625fa359faeaeefed72e62b04c246214ab4ec

Malware Config

Targets

    • Target

      14c352be7111714a07714ab82bfd1b70.exe

    • Size

      544KB

    • MD5

      14c352be7111714a07714ab82bfd1b70

    • SHA1

      3db41efadf56deafeff3ac541ea68c0046843e47

    • SHA256

      1b7bc78836c832c48b86f5c5406741018af99062461b8f4f2f9e55c8fcc076fc

    • SHA512

      45e15889a6d44891755aaa7de5abced9ea1cd5fdb91d2e284430c65647e136ca5a3b246b7a9ff14fbaf0a2d857e625fa359faeaeefed72e62b04c246214ab4ec

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

4
T1005

Tasks