General

  • Target

    b902f074d90ef70d65dfbbbcddb7f70bf1afce2ab96bed0f7182844a068c12e1

  • Size

    1.5MB

  • Sample

    210926-srwtqafag3

  • MD5

    f9743645a09660fdf37d1fd4c2ecbef0

  • SHA1

    c950dab21c0852971c96790fede34f9d65fda3d5

  • SHA256

    b902f074d90ef70d65dfbbbcddb7f70bf1afce2ab96bed0f7182844a068c12e1

  • SHA512

    537796c16ac9c474caa43d33b7c38875841d3012d85d9e6b7a32daa116535477620bdc1ffbdd5b1873040bd4e6704e361df68dbec6f7a30585713a8805ddfea4

Score
10/10

Malware Config

Targets

    • Target

      b902f074d90ef70d65dfbbbcddb7f70bf1afce2ab96bed0f7182844a068c12e1

    • Size

      1.5MB

    • MD5

      f9743645a09660fdf37d1fd4c2ecbef0

    • SHA1

      c950dab21c0852971c96790fede34f9d65fda3d5

    • SHA256

      b902f074d90ef70d65dfbbbcddb7f70bf1afce2ab96bed0f7182844a068c12e1

    • SHA512

      537796c16ac9c474caa43d33b7c38875841d3012d85d9e6b7a32daa116535477620bdc1ffbdd5b1873040bd4e6704e361df68dbec6f7a30585713a8805ddfea4

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks