General

  • Target

    a5122216f5d478645a114af87eb793040e15b9fe0c99579435837af385fcd34d

  • Size

    1.5MB

  • Sample

    210926-wsgb7sfbbp

  • MD5

    8ffdf2d3fbc1da2663d9dcedda96bb2b

  • SHA1

    60fe7e8adfbd16ec4d81cab6cdacb7adf1638474

  • SHA256

    a5122216f5d478645a114af87eb793040e15b9fe0c99579435837af385fcd34d

  • SHA512

    01b492ee3e4009030f0e858e2d2bb5194407685eedbfb8ee090cea392f9c5f6b76667dda46748214c577205028f9ce9ad97b6312c6c37dc6e4652e6e7656a909

Score
10/10

Malware Config

Targets

    • Target

      a5122216f5d478645a114af87eb793040e15b9fe0c99579435837af385fcd34d

    • Size

      1.5MB

    • MD5

      8ffdf2d3fbc1da2663d9dcedda96bb2b

    • SHA1

      60fe7e8adfbd16ec4d81cab6cdacb7adf1638474

    • SHA256

      a5122216f5d478645a114af87eb793040e15b9fe0c99579435837af385fcd34d

    • SHA512

      01b492ee3e4009030f0e858e2d2bb5194407685eedbfb8ee090cea392f9c5f6b76667dda46748214c577205028f9ce9ad97b6312c6c37dc6e4652e6e7656a909

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks