General

  • Target

    def4055093a8c99192cfd87e5dc5ead65ade8b59782aa7cd0044ef9fad8eb496

  • Size

    1.5MB

  • Sample

    210926-qs6dfaeggq

  • MD5

    fa0fc4e438328d168f869cf58bbd671f

  • SHA1

    6f4f2a7b8e5c8cb7e01c81cfa80c400cfc1c8210

  • SHA256

    def4055093a8c99192cfd87e5dc5ead65ade8b59782aa7cd0044ef9fad8eb496

  • SHA512

    be5cee43ad9a624c51b8e45d27f0c5ad4007dc1f2a7aa38792ab913898fe305150bc5578454ded9a98b9ec2cafa0ec23eae08b396cbf4cc8483d1f2687837298

Score
10/10

Malware Config

Targets

    • Target

      def4055093a8c99192cfd87e5dc5ead65ade8b59782aa7cd0044ef9fad8eb496

    • Size

      1.5MB

    • MD5

      fa0fc4e438328d168f869cf58bbd671f

    • SHA1

      6f4f2a7b8e5c8cb7e01c81cfa80c400cfc1c8210

    • SHA256

      def4055093a8c99192cfd87e5dc5ead65ade8b59782aa7cd0044ef9fad8eb496

    • SHA512

      be5cee43ad9a624c51b8e45d27f0c5ad4007dc1f2a7aa38792ab913898fe305150bc5578454ded9a98b9ec2cafa0ec23eae08b396cbf4cc8483d1f2687837298

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks