General

  • Target

    53745473d4da93fdfa8e47ec0859cb54375832974f2b22c4c119e30f9cf3225e

  • Size

    1.5MB

  • Sample

    210926-3wsmzafdbl

  • MD5

    cfa17828f51ebedba4d215c800296732

  • SHA1

    90e2f0e1c8242c6edfb763beee3736f2d74c9f78

  • SHA256

    53745473d4da93fdfa8e47ec0859cb54375832974f2b22c4c119e30f9cf3225e

  • SHA512

    ffa05e2037d37c1ee89eac954d9a0569048e6f452bab9b49413624b1567e052537e676e5bd4f24dcd7ee7eac88bb873c78ec98d3344eea62254544eae11268c0

Score
10/10

Malware Config

Targets

    • Target

      53745473d4da93fdfa8e47ec0859cb54375832974f2b22c4c119e30f9cf3225e

    • Size

      1.5MB

    • MD5

      cfa17828f51ebedba4d215c800296732

    • SHA1

      90e2f0e1c8242c6edfb763beee3736f2d74c9f78

    • SHA256

      53745473d4da93fdfa8e47ec0859cb54375832974f2b22c4c119e30f9cf3225e

    • SHA512

      ffa05e2037d37c1ee89eac954d9a0569048e6f452bab9b49413624b1567e052537e676e5bd4f24dcd7ee7eac88bb873c78ec98d3344eea62254544eae11268c0

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks