General

  • Target

    379f755f7323aa8be6453fa16142555e31823903c255eb8524d92f8962adf8fa

  • Size

    1.5MB

  • Sample

    210926-3c4acsfdak

  • MD5

    c82c9d6d4e8ff44fd98d6fe18125b23b

  • SHA1

    e522f7ed5789fdcde191f3f3483ac454d8784da2

  • SHA256

    379f755f7323aa8be6453fa16142555e31823903c255eb8524d92f8962adf8fa

  • SHA512

    ebce8e5228ac59b324eb69488566e2b30cfa040d01b7fe2ff4097924588b01161649c6fe5405ae7c5d31f8dc6f77ae6ba604dd4971ef1a650915be22f3177aed

Score
10/10

Malware Config

Targets

    • Target

      379f755f7323aa8be6453fa16142555e31823903c255eb8524d92f8962adf8fa

    • Size

      1.5MB

    • MD5

      c82c9d6d4e8ff44fd98d6fe18125b23b

    • SHA1

      e522f7ed5789fdcde191f3f3483ac454d8784da2

    • SHA256

      379f755f7323aa8be6453fa16142555e31823903c255eb8524d92f8962adf8fa

    • SHA512

      ebce8e5228ac59b324eb69488566e2b30cfa040d01b7fe2ff4097924588b01161649c6fe5405ae7c5d31f8dc6f77ae6ba604dd4971ef1a650915be22f3177aed

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks