General

  • Target

    edf92788696e59151889169f242d7fd98248395e6ccac73dd81ae48386696bc9

  • Size

    1.5MB

  • Sample

    210926-p1kw2aegen

  • MD5

    4fed0d390427e53295cf532514492cb1

  • SHA1

    b67f762ffd055ca63d43771f9c1c26529457dd75

  • SHA256

    edf92788696e59151889169f242d7fd98248395e6ccac73dd81ae48386696bc9

  • SHA512

    3955f11cf3c696472f28f0da87a6e81a9beaa282a246bdfa4a371fd1136d4aa809d59e7e80db118d1980db224c21fc5eebe7b5f5818f9c82ecc48e1a00220c55

Score
10/10

Malware Config

Targets

    • Target

      edf92788696e59151889169f242d7fd98248395e6ccac73dd81ae48386696bc9

    • Size

      1.5MB

    • MD5

      4fed0d390427e53295cf532514492cb1

    • SHA1

      b67f762ffd055ca63d43771f9c1c26529457dd75

    • SHA256

      edf92788696e59151889169f242d7fd98248395e6ccac73dd81ae48386696bc9

    • SHA512

      3955f11cf3c696472f28f0da87a6e81a9beaa282a246bdfa4a371fd1136d4aa809d59e7e80db118d1980db224c21fc5eebe7b5f5818f9c82ecc48e1a00220c55

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks