General

  • Target

    9dd68422b27a3541fa4dd1e52979d12e6dcecb0851e0e12090e4b6bacced8afb

  • Size

    1.5MB

  • Sample

    210926-26rb8afchq

  • MD5

    cc2ebce0fadcf8b025ff6d96fdec9da1

  • SHA1

    14797c2c995ef7a9b8b9c0d949066c7cbc34e103

  • SHA256

    9dd68422b27a3541fa4dd1e52979d12e6dcecb0851e0e12090e4b6bacced8afb

  • SHA512

    2189bcdca322d0c61a0b9963e069690d852b6d752a722c81ad4bf2d3cd17075f5e898c40dcf66a6047451be838d11f221b9cee8a15cbce47380cc49d9912ecd1

Score
10/10

Malware Config

Targets

    • Target

      9dd68422b27a3541fa4dd1e52979d12e6dcecb0851e0e12090e4b6bacced8afb

    • Size

      1.5MB

    • MD5

      cc2ebce0fadcf8b025ff6d96fdec9da1

    • SHA1

      14797c2c995ef7a9b8b9c0d949066c7cbc34e103

    • SHA256

      9dd68422b27a3541fa4dd1e52979d12e6dcecb0851e0e12090e4b6bacced8afb

    • SHA512

      2189bcdca322d0c61a0b9963e069690d852b6d752a722c81ad4bf2d3cd17075f5e898c40dcf66a6047451be838d11f221b9cee8a15cbce47380cc49d9912ecd1

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks