General

  • Target

    298020832d7fd56e2e2f819dc1c30cb8ae4e176089c88419d5c005c39fe42a43

  • Size

    1.5MB

  • Sample

    210926-tlfqzsfbb5

  • MD5

    bc95676035f9689765731d9ba708b9e7

  • SHA1

    d06e72aa20cab473e7b9ded1d2363a426381e415

  • SHA256

    298020832d7fd56e2e2f819dc1c30cb8ae4e176089c88419d5c005c39fe42a43

  • SHA512

    c1d6eff6c25d509345c6c655e0ed654275c2a8ed6562ebf9ea0546fe28f25b06c729abd0e7e2c11690d1cdbb659ffc82afb8e2d0ce9a13c6a1002b2339af93bd

Score
10/10

Malware Config

Targets

    • Target

      298020832d7fd56e2e2f819dc1c30cb8ae4e176089c88419d5c005c39fe42a43

    • Size

      1.5MB

    • MD5

      bc95676035f9689765731d9ba708b9e7

    • SHA1

      d06e72aa20cab473e7b9ded1d2363a426381e415

    • SHA256

      298020832d7fd56e2e2f819dc1c30cb8ae4e176089c88419d5c005c39fe42a43

    • SHA512

      c1d6eff6c25d509345c6c655e0ed654275c2a8ed6562ebf9ea0546fe28f25b06c729abd0e7e2c11690d1cdbb659ffc82afb8e2d0ce9a13c6a1002b2339af93bd

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks