General

  • Target

    9ea64ec0f9eaf716742364262909a389f3b37004b7995885fc2e61f8a40ca59a

  • Size

    1.5MB

  • Sample

    210926-tskcrafbc8

  • MD5

    80626185b315a94c7bf6a0a04b82c88e

  • SHA1

    4c1c18f8b9f90dee97aff9ea45174d85de236de7

  • SHA256

    9ea64ec0f9eaf716742364262909a389f3b37004b7995885fc2e61f8a40ca59a

  • SHA512

    1cb6bb412a36a402b46d79babecb816157eb1101cb4871582a50d68730a4a19d18c51459dd08bf3706bd331948ec14c0900c4a4d1551887841dcc88a4d9cf875

Score
10/10

Malware Config

Targets

    • Target

      9ea64ec0f9eaf716742364262909a389f3b37004b7995885fc2e61f8a40ca59a

    • Size

      1.5MB

    • MD5

      80626185b315a94c7bf6a0a04b82c88e

    • SHA1

      4c1c18f8b9f90dee97aff9ea45174d85de236de7

    • SHA256

      9ea64ec0f9eaf716742364262909a389f3b37004b7995885fc2e61f8a40ca59a

    • SHA512

      1cb6bb412a36a402b46d79babecb816157eb1101cb4871582a50d68730a4a19d18c51459dd08bf3706bd331948ec14c0900c4a4d1551887841dcc88a4d9cf875

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks