General

  • Target

    d684801644bed47271d0e90150fa2a36c89c0ba9cb828de63fd3fcfe242c8a19

  • Size

    1.5MB

  • Sample

    210926-rsfnfsehh9

  • MD5

    f28d2a4306a00c1bc684d2b44987a90e

  • SHA1

    2ac5ed2c8c27ffc05c646685ec28788f7fb6909b

  • SHA256

    d684801644bed47271d0e90150fa2a36c89c0ba9cb828de63fd3fcfe242c8a19

  • SHA512

    565a37b9f0038b5b3bb434f48601e2d0b00cae6a26aa06a3387c7121fc38832ccc4b300eb512708165da82dc6d1b51790b3de879e7c7607138becaf2c8009eee

Score
10/10

Malware Config

Targets

    • Target

      d684801644bed47271d0e90150fa2a36c89c0ba9cb828de63fd3fcfe242c8a19

    • Size

      1.5MB

    • MD5

      f28d2a4306a00c1bc684d2b44987a90e

    • SHA1

      2ac5ed2c8c27ffc05c646685ec28788f7fb6909b

    • SHA256

      d684801644bed47271d0e90150fa2a36c89c0ba9cb828de63fd3fcfe242c8a19

    • SHA512

      565a37b9f0038b5b3bb434f48601e2d0b00cae6a26aa06a3387c7121fc38832ccc4b300eb512708165da82dc6d1b51790b3de879e7c7607138becaf2c8009eee

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks