General

  • Target

    9ccb20351726e5bd48b82434c8ca3f88c655cf0a56f538887aaee78fb342fac5

  • Size

    1.5MB

  • Sample

    210926-xvzr1afbfq

  • MD5

    3f5d81bfec6b0be4367e35874abecdc0

  • SHA1

    7d3f2436701fc443287fc2d3509e1cbb650df734

  • SHA256

    9ccb20351726e5bd48b82434c8ca3f88c655cf0a56f538887aaee78fb342fac5

  • SHA512

    1e03da303bcfd03f7fdd71103c9a3b12996a095b66790b16dd1cb14f74d876796701fd9ce7c1343b02b029a58f90e81111f835ad8ae5a09f602fc9f98bb858ae

Score
10/10

Malware Config

Targets

    • Target

      9ccb20351726e5bd48b82434c8ca3f88c655cf0a56f538887aaee78fb342fac5

    • Size

      1.5MB

    • MD5

      3f5d81bfec6b0be4367e35874abecdc0

    • SHA1

      7d3f2436701fc443287fc2d3509e1cbb650df734

    • SHA256

      9ccb20351726e5bd48b82434c8ca3f88c655cf0a56f538887aaee78fb342fac5

    • SHA512

      1e03da303bcfd03f7fdd71103c9a3b12996a095b66790b16dd1cb14f74d876796701fd9ce7c1343b02b029a58f90e81111f835ad8ae5a09f602fc9f98bb858ae

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks