General

  • Target

    3d42d460312b1d5037deeabd3b4fb9262b8cf03cf52bd78d8010b618b37c21ad

  • Size

    1.5MB

  • Sample

    210926-1jyx4sfcfk

  • MD5

    49446ada80c763721b0151c3124fde05

  • SHA1

    79780f9999dea68075873e9e37a09be1a70eb1b6

  • SHA256

    3d42d460312b1d5037deeabd3b4fb9262b8cf03cf52bd78d8010b618b37c21ad

  • SHA512

    f7c02e678f9bd10908d33e1ec764c2dfb3a471f1b4b83f170722abc9dee9fb097538c5dc20f8b3463b006063116dcfa75018dc931e4a83ca2821b62d0bcf3593

Score
10/10

Malware Config

Targets

    • Target

      3d42d460312b1d5037deeabd3b4fb9262b8cf03cf52bd78d8010b618b37c21ad

    • Size

      1.5MB

    • MD5

      49446ada80c763721b0151c3124fde05

    • SHA1

      79780f9999dea68075873e9e37a09be1a70eb1b6

    • SHA256

      3d42d460312b1d5037deeabd3b4fb9262b8cf03cf52bd78d8010b618b37c21ad

    • SHA512

      f7c02e678f9bd10908d33e1ec764c2dfb3a471f1b4b83f170722abc9dee9fb097538c5dc20f8b3463b006063116dcfa75018dc931e4a83ca2821b62d0bcf3593

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks