General

  • Target

    3127446f32198dcc58ed4f261e02e7ca.exe

  • Size

    600KB

  • Sample

    210421-x43441ltas

  • MD5

    3127446f32198dcc58ed4f261e02e7ca

  • SHA1

    ddc8a7bd64edf882fc372d0ba7f2b849953951b0

  • SHA256

    1b9d19121084397c2e419fc9d37fa9ed7be2b7f772f3be94e83c20642b178d0a

  • SHA512

    49f4f339fffc11647a4e91a7690e4ea0de76f4e1a0b078f27c8fb01c176feb4f92507a5fa0458981bc0e8edf1ae91acd46fff3ea2d928b6cc18f7e081c76cb31

Malware Config

Targets

    • Target

      3127446f32198dcc58ed4f261e02e7ca.exe

    • Size

      600KB

    • MD5

      3127446f32198dcc58ed4f261e02e7ca

    • SHA1

      ddc8a7bd64edf882fc372d0ba7f2b849953951b0

    • SHA256

      1b9d19121084397c2e419fc9d37fa9ed7be2b7f772f3be94e83c20642b178d0a

    • SHA512

      49f4f339fffc11647a4e91a7690e4ea0de76f4e1a0b078f27c8fb01c176feb4f92507a5fa0458981bc0e8edf1ae91acd46fff3ea2d928b6cc18f7e081c76cb31

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Tasks