General

  • Target

    b13fd608d2b0c4d44cf3a21ad74bf78589bd3ddaeb487e8301e21f417394bfdb

  • Size

    1.5MB

  • Sample

    210926-pnpz8aehb5

  • MD5

    a17f50e311c52a566dc17abf3a4e9b24

  • SHA1

    609776ea012cdf8a786cb57e2ead2a2ba174ec6b

  • SHA256

    b13fd608d2b0c4d44cf3a21ad74bf78589bd3ddaeb487e8301e21f417394bfdb

  • SHA512

    a21835be657d1c28140c61b34cdafd1fdd021d346da94298605dba1fcc9d4c549694e8cea204587b65c656aa8fe5b7917d5147f3ffc4801491436f1e54b3bcf2

Score
10/10

Malware Config

Targets

    • Target

      b13fd608d2b0c4d44cf3a21ad74bf78589bd3ddaeb487e8301e21f417394bfdb

    • Size

      1.5MB

    • MD5

      a17f50e311c52a566dc17abf3a4e9b24

    • SHA1

      609776ea012cdf8a786cb57e2ead2a2ba174ec6b

    • SHA256

      b13fd608d2b0c4d44cf3a21ad74bf78589bd3ddaeb487e8301e21f417394bfdb

    • SHA512

      a21835be657d1c28140c61b34cdafd1fdd021d346da94298605dba1fcc9d4c549694e8cea204587b65c656aa8fe5b7917d5147f3ffc4801491436f1e54b3bcf2

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks