General

  • Target

    d5dec165e4b362f2b82b899cc314a15445712ce577c27e5762791a95a281c987

  • Size

    603KB

  • Sample

    210926-qk5f6sehe2

  • MD5

    1516f93688d9622055e418b05836f6d9

  • SHA1

    26974fece6e6dea6a284f8b0189af306d50ca31b

  • SHA256

    d5dec165e4b362f2b82b899cc314a15445712ce577c27e5762791a95a281c987

  • SHA512

    adc9cb5eb0e09e94a254636898e9dd605a19d2962b53c396864600158edd22b7d5b70a1d447e5e90d0a1cf2f053ec164c5c9f9fbaa9f0e3e4a458295ffb36ea0

Malware Config

Targets

    • Target

      d5dec165e4b362f2b82b899cc314a15445712ce577c27e5762791a95a281c987

    • Size

      603KB

    • MD5

      1516f93688d9622055e418b05836f6d9

    • SHA1

      26974fece6e6dea6a284f8b0189af306d50ca31b

    • SHA256

      d5dec165e4b362f2b82b899cc314a15445712ce577c27e5762791a95a281c987

    • SHA512

      adc9cb5eb0e09e94a254636898e9dd605a19d2962b53c396864600158edd22b7d5b70a1d447e5e90d0a1cf2f053ec164c5c9f9fbaa9f0e3e4a458295ffb36ea0

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks