General

  • Target

    89f2e28dbe7b77185c5da962317814400ef980a96090104235cbc0fbfe40df80

  • Size

    1.5MB

  • Sample

    210926-y58nbsfcbr

  • MD5

    660777bdd3ce69da567649fc359c1e2c

  • SHA1

    e346dbde4623355c09569dadca8c4faf8224afdf

  • SHA256

    89f2e28dbe7b77185c5da962317814400ef980a96090104235cbc0fbfe40df80

  • SHA512

    53a813902534853e6d5dbeb7d479da653672b28708c987e32e001f2afc26e0b05171198b49dcea7a72b73d02f47e4c373fab8cfc84b969396c8e1a1da7b539bf

Score
10/10

Malware Config

Targets

    • Target

      89f2e28dbe7b77185c5da962317814400ef980a96090104235cbc0fbfe40df80

    • Size

      1.5MB

    • MD5

      660777bdd3ce69da567649fc359c1e2c

    • SHA1

      e346dbde4623355c09569dadca8c4faf8224afdf

    • SHA256

      89f2e28dbe7b77185c5da962317814400ef980a96090104235cbc0fbfe40df80

    • SHA512

      53a813902534853e6d5dbeb7d479da653672b28708c987e32e001f2afc26e0b05171198b49dcea7a72b73d02f47e4c373fab8cfc84b969396c8e1a1da7b539bf

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks