General

  • Target

    5c4509c557926d518045766f86de310d9ced00683d375a80583b3782a74f4b35

  • Size

    1.5MB

  • Sample

    210926-swhsnaehhr

  • MD5

    e76aa0cbbb2ee3b275ac7dbd99ffd5fe

  • SHA1

    f3b4f40cb78d4006db3fe3f3cb96e096eab52787

  • SHA256

    5c4509c557926d518045766f86de310d9ced00683d375a80583b3782a74f4b35

  • SHA512

    309470fcb7d82e2e4f0cd5b02b52a4050b4b6339be94e8c040778f4b485e5eed51fadbc82d98137734b50edcb3f4a7c422195eb1ef6330e52e914df3c4863a9c

Score
10/10

Malware Config

Targets

    • Target

      5c4509c557926d518045766f86de310d9ced00683d375a80583b3782a74f4b35

    • Size

      1.5MB

    • MD5

      e76aa0cbbb2ee3b275ac7dbd99ffd5fe

    • SHA1

      f3b4f40cb78d4006db3fe3f3cb96e096eab52787

    • SHA256

      5c4509c557926d518045766f86de310d9ced00683d375a80583b3782a74f4b35

    • SHA512

      309470fcb7d82e2e4f0cd5b02b52a4050b4b6339be94e8c040778f4b485e5eed51fadbc82d98137734b50edcb3f4a7c422195eb1ef6330e52e914df3c4863a9c

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks