General

  • Target

    c1a313fe704f9b8c9fe815884a14309822744b4c4b2cf9e6d7f69bb644e9ac80

  • Size

    1.5MB

  • Sample

    210926-wynngafbcm

  • MD5

    5e05fe3d853869afd78b2c795f5774a6

  • SHA1

    f9dd24785117c17e858606a23da1d2995da3622c

  • SHA256

    c1a313fe704f9b8c9fe815884a14309822744b4c4b2cf9e6d7f69bb644e9ac80

  • SHA512

    4c7bba839cc3c8c35a2f630abd237073b09eb9fdf4ebde9d7da95048dc0002de1c770d1a49bf91fe71a157ef99e812928cf3cc212175de9120bf4214d30a0324

Score
10/10

Malware Config

Targets

    • Target

      c1a313fe704f9b8c9fe815884a14309822744b4c4b2cf9e6d7f69bb644e9ac80

    • Size

      1.5MB

    • MD5

      5e05fe3d853869afd78b2c795f5774a6

    • SHA1

      f9dd24785117c17e858606a23da1d2995da3622c

    • SHA256

      c1a313fe704f9b8c9fe815884a14309822744b4c4b2cf9e6d7f69bb644e9ac80

    • SHA512

      4c7bba839cc3c8c35a2f630abd237073b09eb9fdf4ebde9d7da95048dc0002de1c770d1a49bf91fe71a157ef99e812928cf3cc212175de9120bf4214d30a0324

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks