General

  • Target

    0d1081cfdb08c95355dae27cf9d09eb98046ad899ca4f71b68da6c2dd7a760dd

  • Size

    1.5MB

  • Sample

    210926-14yg3sfdd4

  • MD5

    140afbe7ce74a100dbb2682752db1e3e

  • SHA1

    d3949eddee73e38e1e6abb16e1e966cd900174d1

  • SHA256

    0d1081cfdb08c95355dae27cf9d09eb98046ad899ca4f71b68da6c2dd7a760dd

  • SHA512

    64ac3e0ba7bf58dd37ebacae8891352a040fefd9bca8ccb088be59ae22ca757dd7895f4a70e6a2b647b38dfcb2c1af712a1212b1732df9601197a920796f9288

Score
10/10

Malware Config

Targets

    • Target

      0d1081cfdb08c95355dae27cf9d09eb98046ad899ca4f71b68da6c2dd7a760dd

    • Size

      1.5MB

    • MD5

      140afbe7ce74a100dbb2682752db1e3e

    • SHA1

      d3949eddee73e38e1e6abb16e1e966cd900174d1

    • SHA256

      0d1081cfdb08c95355dae27cf9d09eb98046ad899ca4f71b68da6c2dd7a760dd

    • SHA512

      64ac3e0ba7bf58dd37ebacae8891352a040fefd9bca8ccb088be59ae22ca757dd7895f4a70e6a2b647b38dfcb2c1af712a1212b1732df9601197a920796f9288

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks