General

  • Target

    b2bd4f18c6f5879c55d2836f3e76d893cfba77d98a0f8d021a5c37ab5ca2e40f

  • Size

    1.5MB

  • Sample

    210926-2z1mbafde5

  • MD5

    a405cf8a9041cd94a256f6fd5c984131

  • SHA1

    f32e046daa44ed2595e8ced7d076e6d3ff2e0451

  • SHA256

    b2bd4f18c6f5879c55d2836f3e76d893cfba77d98a0f8d021a5c37ab5ca2e40f

  • SHA512

    017ef1d9b5ceeb0a178adada505a01efd994f2eb8f0c63ef4e60e3b458488ca91fb76a702510421b3522fc3fadd82945fcd917c7dd4a293e926cc5ba75ef5c44

Score
10/10

Malware Config

Targets

    • Target

      b2bd4f18c6f5879c55d2836f3e76d893cfba77d98a0f8d021a5c37ab5ca2e40f

    • Size

      1.5MB

    • MD5

      a405cf8a9041cd94a256f6fd5c984131

    • SHA1

      f32e046daa44ed2595e8ced7d076e6d3ff2e0451

    • SHA256

      b2bd4f18c6f5879c55d2836f3e76d893cfba77d98a0f8d021a5c37ab5ca2e40f

    • SHA512

      017ef1d9b5ceeb0a178adada505a01efd994f2eb8f0c63ef4e60e3b458488ca91fb76a702510421b3522fc3fadd82945fcd917c7dd4a293e926cc5ba75ef5c44

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks