General

  • Target

    24ae87f1f17c49521ed8ed56b9a2981135f47d4c7ea9ed17358dc4e38e0b6eb8

  • Size

    1.5MB

  • Sample

    210926-nvzybseffl

  • MD5

    72c52b0ddd8cd7c4eac71f594238386c

  • SHA1

    c0a6f2d11dffe74c311dd9517aa2960bc0b9f42d

  • SHA256

    24ae87f1f17c49521ed8ed56b9a2981135f47d4c7ea9ed17358dc4e38e0b6eb8

  • SHA512

    99e711ad5195518e5fc3b00b3b2f8fabbbc8413ef3839dad031fa3b944818935fcd31d96d6ed63b9d40eda8f6c1d647ade0d89c87b90b1773cbb4a82e49e553f

Score
10/10

Malware Config

Targets

    • Target

      24ae87f1f17c49521ed8ed56b9a2981135f47d4c7ea9ed17358dc4e38e0b6eb8

    • Size

      1.5MB

    • MD5

      72c52b0ddd8cd7c4eac71f594238386c

    • SHA1

      c0a6f2d11dffe74c311dd9517aa2960bc0b9f42d

    • SHA256

      24ae87f1f17c49521ed8ed56b9a2981135f47d4c7ea9ed17358dc4e38e0b6eb8

    • SHA512

      99e711ad5195518e5fc3b00b3b2f8fabbbc8413ef3839dad031fa3b944818935fcd31d96d6ed63b9d40eda8f6c1d647ade0d89c87b90b1773cbb4a82e49e553f

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks