General

  • Target

    332aad15049a1f46eee199236e7a46c53ea04b6fe63079ad2db70839a41b3c15

  • Size

    1.5MB

  • Sample

    210926-p6v9ysehc7

  • MD5

    584f45058842b22805828df76bd94956

  • SHA1

    a343399d9313bf47be11cbd6fc063637bf8ef5fb

  • SHA256

    332aad15049a1f46eee199236e7a46c53ea04b6fe63079ad2db70839a41b3c15

  • SHA512

    50f80ad5b8980a4689d82d04accd7ca523b3d0e14bfbb8f798d756e0c71cf7b6210ca30bbbbac20cd9be5e245191695df6c2432e913de980f6a25157e6eed313

Score
10/10

Malware Config

Targets

    • Target

      332aad15049a1f46eee199236e7a46c53ea04b6fe63079ad2db70839a41b3c15

    • Size

      1.5MB

    • MD5

      584f45058842b22805828df76bd94956

    • SHA1

      a343399d9313bf47be11cbd6fc063637bf8ef5fb

    • SHA256

      332aad15049a1f46eee199236e7a46c53ea04b6fe63079ad2db70839a41b3c15

    • SHA512

      50f80ad5b8980a4689d82d04accd7ca523b3d0e14bfbb8f798d756e0c71cf7b6210ca30bbbbac20cd9be5e245191695df6c2432e913de980f6a25157e6eed313

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks