General

  • Target

    4acbe2a2b4b206c7474489b903752e6131ffd8d6818722ab7aee33fad12798a9

  • Size

    1.5MB

  • Sample

    210926-mv9bbsefh4

  • MD5

    2d975171cb146791649234bed23fda60

  • SHA1

    409409241ef5f3747f22144199e3188fd93dc938

  • SHA256

    4acbe2a2b4b206c7474489b903752e6131ffd8d6818722ab7aee33fad12798a9

  • SHA512

    4a8cb249a7b746462f24005a8bee2634602f858da7d46ae3eea572cd08e8c1a8634b6d434b9b65434f07b97644c515d3f3d638469909ba19a3d1df3f77210620

Score
10/10

Malware Config

Targets

    • Target

      4acbe2a2b4b206c7474489b903752e6131ffd8d6818722ab7aee33fad12798a9

    • Size

      1.5MB

    • MD5

      2d975171cb146791649234bed23fda60

    • SHA1

      409409241ef5f3747f22144199e3188fd93dc938

    • SHA256

      4acbe2a2b4b206c7474489b903752e6131ffd8d6818722ab7aee33fad12798a9

    • SHA512

      4a8cb249a7b746462f24005a8bee2634602f858da7d46ae3eea572cd08e8c1a8634b6d434b9b65434f07b97644c515d3f3d638469909ba19a3d1df3f77210620

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks