General

  • Target

    12d782ec589ec8ce143851262e099c3f2448f1f29347379de0487b4ca059e92c

  • Size

    1.5MB

  • Sample

    210926-rglqbsehf9

  • MD5

    17314f4799b37c194611426347ca4bd2

  • SHA1

    bd1ee177b6a6952b1b3b03fe887170dacd00569b

  • SHA256

    12d782ec589ec8ce143851262e099c3f2448f1f29347379de0487b4ca059e92c

  • SHA512

    feab62cfb7e1316f90fad22146d092684bb428a5a628a1027e3a3d96a437603614390563f469c2546474016cebd6acfb4e6ecc20dcec6341d8a532a8219df7d2

Score
10/10

Malware Config

Targets

    • Target

      12d782ec589ec8ce143851262e099c3f2448f1f29347379de0487b4ca059e92c

    • Size

      1.5MB

    • MD5

      17314f4799b37c194611426347ca4bd2

    • SHA1

      bd1ee177b6a6952b1b3b03fe887170dacd00569b

    • SHA256

      12d782ec589ec8ce143851262e099c3f2448f1f29347379de0487b4ca059e92c

    • SHA512

      feab62cfb7e1316f90fad22146d092684bb428a5a628a1027e3a3d96a437603614390563f469c2546474016cebd6acfb4e6ecc20dcec6341d8a532a8219df7d2

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks