General

  • Target

    e772feb82fbe1ae2d0a157d1c3911e25744f5877d508ec32536e03b0c59bc582

  • Size

    1.5MB

  • Sample

    210926-2hecrafcgm

  • MD5

    ad2abd31423102dc67fc8bc207584e9b

  • SHA1

    ddf00ff18ca8497a51f1c4bfb9e9ce18df131952

  • SHA256

    e772feb82fbe1ae2d0a157d1c3911e25744f5877d508ec32536e03b0c59bc582

  • SHA512

    77e95e63c7fd6797595d700c05fa0ebb8cee0e30de25ea5c6f75e85a861922a13c9c4842dfcbaf9f1b3ff7872cdb09d7c641d46e3a0b458e258620aad4b4c093

Score
10/10

Malware Config

Targets

    • Target

      e772feb82fbe1ae2d0a157d1c3911e25744f5877d508ec32536e03b0c59bc582

    • Size

      1.5MB

    • MD5

      ad2abd31423102dc67fc8bc207584e9b

    • SHA1

      ddf00ff18ca8497a51f1c4bfb9e9ce18df131952

    • SHA256

      e772feb82fbe1ae2d0a157d1c3911e25744f5877d508ec32536e03b0c59bc582

    • SHA512

      77e95e63c7fd6797595d700c05fa0ebb8cee0e30de25ea5c6f75e85a861922a13c9c4842dfcbaf9f1b3ff7872cdb09d7c641d46e3a0b458e258620aad4b4c093

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks