General

  • Target

    696ee59afb366ec022f7ef69b6009de881736da7e1178b288e2cba7f84f712e0

  • Size

    1.5MB

  • Sample

    210926-sjhxwsfaf3

  • MD5

    7f7084b7deffa79527dc17525590f257

  • SHA1

    6960e313e987dc51d59e484c1439e259cbff3abc

  • SHA256

    696ee59afb366ec022f7ef69b6009de881736da7e1178b288e2cba7f84f712e0

  • SHA512

    931fe75b153b2ca1921740f04241b82f36342ccb17fab3d3437b5b0676e8fd16eedfe9835f49ccbef29be53bf6824f282f7ae54b5a31921b35e32a642a504849

Score
10/10

Malware Config

Targets

    • Target

      696ee59afb366ec022f7ef69b6009de881736da7e1178b288e2cba7f84f712e0

    • Size

      1.5MB

    • MD5

      7f7084b7deffa79527dc17525590f257

    • SHA1

      6960e313e987dc51d59e484c1439e259cbff3abc

    • SHA256

      696ee59afb366ec022f7ef69b6009de881736da7e1178b288e2cba7f84f712e0

    • SHA512

      931fe75b153b2ca1921740f04241b82f36342ccb17fab3d3437b5b0676e8fd16eedfe9835f49ccbef29be53bf6824f282f7ae54b5a31921b35e32a642a504849

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks