General

  • Target

    43c7eadce83824993398bc1954fc92ce5be61918bd668575ab84336f9100dfcf

  • Size

    1.5MB

  • Sample

    210926-m7acrsefdn

  • MD5

    355c859d0eca8a5461c988a31b2ee18b

  • SHA1

    cc5660744d0edf048c692c32d9bb49d2d28cbdaf

  • SHA256

    43c7eadce83824993398bc1954fc92ce5be61918bd668575ab84336f9100dfcf

  • SHA512

    16ea8dad5ab1b2e2e1ea0c627cd56f71cf55eb31d0b9688bb0d875667c0c3cbdb99aa4766e54a57f60ad6ae1d12796a83f8e0f5329f2a803bbf54814c291fc18

Score
10/10

Malware Config

Targets

    • Target

      43c7eadce83824993398bc1954fc92ce5be61918bd668575ab84336f9100dfcf

    • Size

      1.5MB

    • MD5

      355c859d0eca8a5461c988a31b2ee18b

    • SHA1

      cc5660744d0edf048c692c32d9bb49d2d28cbdaf

    • SHA256

      43c7eadce83824993398bc1954fc92ce5be61918bd668575ab84336f9100dfcf

    • SHA512

      16ea8dad5ab1b2e2e1ea0c627cd56f71cf55eb31d0b9688bb0d875667c0c3cbdb99aa4766e54a57f60ad6ae1d12796a83f8e0f5329f2a803bbf54814c291fc18

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks