General

  • Target

    83bf9e49eeb02725e6833ac1524e309d.exe

  • Size

    561KB

  • Sample

    210421-phlts47r96

  • MD5

    83bf9e49eeb02725e6833ac1524e309d

  • SHA1

    ad91450e5a258e1a6be36c8c98b034fe8631eb7b

  • SHA256

    cac95f30171e924f6ac524313a8a0d7ad91a325665deb9ae16a1cd61bbd3940c

  • SHA512

    c947690918c36ff4afb974005d887be67ad80e3ed065a77e99ba290f7d14837c0546637528bf84f0fdad7fc3071dc56aa8ea186d85c8334cda8a5059a6b14b35

Malware Config

Targets

    • Target

      83bf9e49eeb02725e6833ac1524e309d.exe

    • Size

      561KB

    • MD5

      83bf9e49eeb02725e6833ac1524e309d

    • SHA1

      ad91450e5a258e1a6be36c8c98b034fe8631eb7b

    • SHA256

      cac95f30171e924f6ac524313a8a0d7ad91a325665deb9ae16a1cd61bbd3940c

    • SHA512

      c947690918c36ff4afb974005d887be67ad80e3ed065a77e99ba290f7d14837c0546637528bf84f0fdad7fc3071dc56aa8ea186d85c8334cda8a5059a6b14b35

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Tasks