General

  • Target

    4b4df8f0533dcd79bd2351efb6510ad373fce0b3c59dbb3c05491570cb440382

  • Size

    1.5MB

  • Sample

    210926-v77bhafahr

  • MD5

    7b24add24cecd73a00be8f529171b9c5

  • SHA1

    d797ef568dbfb840a70046214f103eabe4857f68

  • SHA256

    4b4df8f0533dcd79bd2351efb6510ad373fce0b3c59dbb3c05491570cb440382

  • SHA512

    cc06c76599aef9da1d256ab591e4205d5540a8ad3fda58b6f893d21c16331b8075f0ece8cfb625afa3c55b67fcb8da8deef975f1b21a50d57073688e46667d3f

Score
10/10

Malware Config

Targets

    • Target

      4b4df8f0533dcd79bd2351efb6510ad373fce0b3c59dbb3c05491570cb440382

    • Size

      1.5MB

    • MD5

      7b24add24cecd73a00be8f529171b9c5

    • SHA1

      d797ef568dbfb840a70046214f103eabe4857f68

    • SHA256

      4b4df8f0533dcd79bd2351efb6510ad373fce0b3c59dbb3c05491570cb440382

    • SHA512

      cc06c76599aef9da1d256ab591e4205d5540a8ad3fda58b6f893d21c16331b8075f0ece8cfb625afa3c55b67fcb8da8deef975f1b21a50d57073688e46667d3f

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks