General

  • Target

    64b637e99cf4f0db78ead6b7336032039d1fec65e805090d9c0a6b6cd16e0410

  • Size

    1.5MB

  • Sample

    210926-3klehsfdf5

  • MD5

    45ffac185f33de7cacc6efa60cdc2fb0

  • SHA1

    60dfacd6a56df3a661f3241548a4b6b045404665

  • SHA256

    64b637e99cf4f0db78ead6b7336032039d1fec65e805090d9c0a6b6cd16e0410

  • SHA512

    2aeaf35dde63910a7084c0b48bc469d6156490384eeb38ca8334c458ee933315d1fdecc1ac3331c111437c9a81472f3086887dd9bbc0c53f9d17640249b0a0f8

Score
10/10

Malware Config

Targets

    • Target

      64b637e99cf4f0db78ead6b7336032039d1fec65e805090d9c0a6b6cd16e0410

    • Size

      1.5MB

    • MD5

      45ffac185f33de7cacc6efa60cdc2fb0

    • SHA1

      60dfacd6a56df3a661f3241548a4b6b045404665

    • SHA256

      64b637e99cf4f0db78ead6b7336032039d1fec65e805090d9c0a6b6cd16e0410

    • SHA512

      2aeaf35dde63910a7084c0b48bc469d6156490384eeb38ca8334c458ee933315d1fdecc1ac3331c111437c9a81472f3086887dd9bbc0c53f9d17640249b0a0f8

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks