General

  • Target

    filename.exe

  • Size

    603KB

  • Sample

    210926-n1z6aaegg3

  • MD5

    f4776355dab5ca866b74a6e3c64b935a

  • SHA1

    2a004c5f92eaa9fe27a39a6094992ea8a95dd44e

  • SHA256

    85945207f0b83c29d5b878633871b71ba18937d3d762ce4ffd0802832e32f4c7

  • SHA512

    ff8baedf73cb1fc449cdf9c5d1f82c2468c0acfb80e0de6a9b77964ae329a5015cfd7c48aa20e60db296905054b59f581b39b3cf1a2af23dfacc8a78ea11ec48

Malware Config

Targets

    • Target

      filename.exe

    • Size

      603KB

    • MD5

      f4776355dab5ca866b74a6e3c64b935a

    • SHA1

      2a004c5f92eaa9fe27a39a6094992ea8a95dd44e

    • SHA256

      85945207f0b83c29d5b878633871b71ba18937d3d762ce4ffd0802832e32f4c7

    • SHA512

      ff8baedf73cb1fc449cdf9c5d1f82c2468c0acfb80e0de6a9b77964ae329a5015cfd7c48aa20e60db296905054b59f581b39b3cf1a2af23dfacc8a78ea11ec48

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks