General

  • Target

    8ce2fba0a6d422986f47bf082211b090d42ebdc41aa78b031c40d321ca3de79e

  • Size

    1.5MB

  • Sample

    210926-qjqxdsehd9

  • MD5

    f0134b01d82c146a6140e3d6161368b3

  • SHA1

    834eae639bc851e44b861c890a59203434523f7a

  • SHA256

    8ce2fba0a6d422986f47bf082211b090d42ebdc41aa78b031c40d321ca3de79e

  • SHA512

    473df0344deb8405831ba6d19c213377a386e18ddc593543229465747521b0a5cb996e0a54bcf732ce82079df8d389d741442c0f22118912144e8fcc83785440

Score
10/10

Malware Config

Targets

    • Target

      8ce2fba0a6d422986f47bf082211b090d42ebdc41aa78b031c40d321ca3de79e

    • Size

      1.5MB

    • MD5

      f0134b01d82c146a6140e3d6161368b3

    • SHA1

      834eae639bc851e44b861c890a59203434523f7a

    • SHA256

      8ce2fba0a6d422986f47bf082211b090d42ebdc41aa78b031c40d321ca3de79e

    • SHA512

      473df0344deb8405831ba6d19c213377a386e18ddc593543229465747521b0a5cb996e0a54bcf732ce82079df8d389d741442c0f22118912144e8fcc83785440

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks