General

  • Target

    d9f21c85895f7d9c183da68d659d9bf463be752e92acff488b2a92cfc82b10f8

  • Size

    1.5MB

  • Sample

    210926-nw56qsegc7

  • MD5

    27b2833e8f219b85eb272fd3921fea61

  • SHA1

    425844ee3080eba39852e3fbc99d8952f81f6f3e

  • SHA256

    d9f21c85895f7d9c183da68d659d9bf463be752e92acff488b2a92cfc82b10f8

  • SHA512

    fecc7b94dd447d3fdde3c06fed3e365d9b1c2bd366e44b1af50d608c12932620a5b41fa4368ffe84539d7f0c2288fbba65e6b562ac4054ebd1e4417d4dee8478

Score
10/10

Malware Config

Targets

    • Target

      d9f21c85895f7d9c183da68d659d9bf463be752e92acff488b2a92cfc82b10f8

    • Size

      1.5MB

    • MD5

      27b2833e8f219b85eb272fd3921fea61

    • SHA1

      425844ee3080eba39852e3fbc99d8952f81f6f3e

    • SHA256

      d9f21c85895f7d9c183da68d659d9bf463be752e92acff488b2a92cfc82b10f8

    • SHA512

      fecc7b94dd447d3fdde3c06fed3e365d9b1c2bd366e44b1af50d608c12932620a5b41fa4368ffe84539d7f0c2288fbba65e6b562ac4054ebd1e4417d4dee8478

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks