General

  • Target

    50bade00b59072e763d8a97b171bc57660314bb7645d927c9903e056e13aefaf

  • Size

    1.5MB

  • Sample

    210926-19wwfafdd6

  • MD5

    668a3a244482b4d3dd9610fae82a4c60

  • SHA1

    0576120b63821994a455710677de12956763a070

  • SHA256

    50bade00b59072e763d8a97b171bc57660314bb7645d927c9903e056e13aefaf

  • SHA512

    81fa7e5be9e9adbe2a36aa3627576d5a4a52b07ae5648d471ee5c6cce4e9c2b91c86797005899a73da5af404174fbed971f3c4485dfc17b390d76a290fa2148a

Score
10/10

Malware Config

Targets

    • Target

      50bade00b59072e763d8a97b171bc57660314bb7645d927c9903e056e13aefaf

    • Size

      1.5MB

    • MD5

      668a3a244482b4d3dd9610fae82a4c60

    • SHA1

      0576120b63821994a455710677de12956763a070

    • SHA256

      50bade00b59072e763d8a97b171bc57660314bb7645d927c9903e056e13aefaf

    • SHA512

      81fa7e5be9e9adbe2a36aa3627576d5a4a52b07ae5648d471ee5c6cce4e9c2b91c86797005899a73da5af404174fbed971f3c4485dfc17b390d76a290fa2148a

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks