General

  • Target

    9b39aa3c723c2eef7e7e39f89443d3aa.exe

  • Size

    636KB

  • Sample

    210423-pzk33nz88a

  • MD5

    9b39aa3c723c2eef7e7e39f89443d3aa

  • SHA1

    359dbd9cdf30fa03c154487f4ccd537f372c492c

  • SHA256

    c885cbcd6ec66d984d6137a5cd9b60474760719bad20bf2593e4db3cb3f29244

  • SHA512

    8d6c090976bddb5924b267bb6e07b1330ac864bcd17c3d0ca02c861d7702d08245db1f7d6e4efc7c8af9e0609cd41ee6ba8ae10e1d78060d55a619b02b3d33db

Malware Config

Targets

    • Target

      9b39aa3c723c2eef7e7e39f89443d3aa.exe

    • Size

      636KB

    • MD5

      9b39aa3c723c2eef7e7e39f89443d3aa

    • SHA1

      359dbd9cdf30fa03c154487f4ccd537f372c492c

    • SHA256

      c885cbcd6ec66d984d6137a5cd9b60474760719bad20bf2593e4db3cb3f29244

    • SHA512

      8d6c090976bddb5924b267bb6e07b1330ac864bcd17c3d0ca02c861d7702d08245db1f7d6e4efc7c8af9e0609cd41ee6ba8ae10e1d78060d55a619b02b3d33db

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

4
T1005

Tasks