General

  • Target

    96d7b2f6f6f13ab8b971a95a7513c547.exe

  • Size

    1.1MB

  • Sample

    210412-1l2pkdj8q6

  • MD5

    96d7b2f6f6f13ab8b971a95a7513c547

  • SHA1

    5cc439b858fb5fc55eff74a5e3939a5d2dcc3e36

  • SHA256

    0ae02edbc714dfd70bc71151c585d12d35b407c831ea5c9abf5c32376ce14a45

  • SHA512

    3fc4e92c849ecbe4e4f767f65f0ec468d2ba6e62a01d30ac6d908042c0ec08cef5e5448f32b5b3d0c8c832c07470fbc60e948cd84ca59442d5a2b9790aa82e72

Malware Config

Targets

    • Target

      96d7b2f6f6f13ab8b971a95a7513c547.exe

    • Size

      1.1MB

    • MD5

      96d7b2f6f6f13ab8b971a95a7513c547

    • SHA1

      5cc439b858fb5fc55eff74a5e3939a5d2dcc3e36

    • SHA256

      0ae02edbc714dfd70bc71151c585d12d35b407c831ea5c9abf5c32376ce14a45

    • SHA512

      3fc4e92c849ecbe4e4f767f65f0ec468d2ba6e62a01d30ac6d908042c0ec08cef5e5448f32b5b3d0c8c832c07470fbc60e948cd84ca59442d5a2b9790aa82e72

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Deletes itself

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks