General

  • Target

    587477e93ae96c4a9d4e0b3599a532f5772a8528aeb1a31f7a466cd12ef68eb7

  • Size

    1.5MB

  • Sample

    210926-rzhfmaehcj

  • MD5

    6668c6589daf6f711382d55cee906cd7

  • SHA1

    829d99d5cf88b5e709138475c549e57cd0d04e2f

  • SHA256

    587477e93ae96c4a9d4e0b3599a532f5772a8528aeb1a31f7a466cd12ef68eb7

  • SHA512

    7173901b88c797d9dd67fc467709b5aa42afe03259c8887aaba673c84ebcec6be473dd7fe7b8002cd81974478d7541bbd44bf42442811fb4ef56559f94c03968

Score
10/10

Malware Config

Targets

    • Target

      587477e93ae96c4a9d4e0b3599a532f5772a8528aeb1a31f7a466cd12ef68eb7

    • Size

      1.5MB

    • MD5

      6668c6589daf6f711382d55cee906cd7

    • SHA1

      829d99d5cf88b5e709138475c549e57cd0d04e2f

    • SHA256

      587477e93ae96c4a9d4e0b3599a532f5772a8528aeb1a31f7a466cd12ef68eb7

    • SHA512

      7173901b88c797d9dd67fc467709b5aa42afe03259c8887aaba673c84ebcec6be473dd7fe7b8002cd81974478d7541bbd44bf42442811fb4ef56559f94c03968

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks