General

  • Target

    c0afe7cb620b58842c9ec120442b921b1eb93943cbea2e260a1d17da44b4afa0

  • Size

    1.5MB

  • Sample

    210926-vvsycafbf7

  • MD5

    b2912cb6988dc952a942a53c3b2839fd

  • SHA1

    1ff3669c58e74f2b585a55bfcfa15da943c557b6

  • SHA256

    c0afe7cb620b58842c9ec120442b921b1eb93943cbea2e260a1d17da44b4afa0

  • SHA512

    1631017862c2e5be369c126db72ee9fbdb980771852aab85defa2ccdefbbdd8b3d097fc011bc710a81f5a7213a4b0d364de4d412ae18530bfafcd9a8a45d7be4

Score
10/10

Malware Config

Targets

    • Target

      c0afe7cb620b58842c9ec120442b921b1eb93943cbea2e260a1d17da44b4afa0

    • Size

      1.5MB

    • MD5

      b2912cb6988dc952a942a53c3b2839fd

    • SHA1

      1ff3669c58e74f2b585a55bfcfa15da943c557b6

    • SHA256

      c0afe7cb620b58842c9ec120442b921b1eb93943cbea2e260a1d17da44b4afa0

    • SHA512

      1631017862c2e5be369c126db72ee9fbdb980771852aab85defa2ccdefbbdd8b3d097fc011bc710a81f5a7213a4b0d364de4d412ae18530bfafcd9a8a45d7be4

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks