General

  • Target

    4d7309d129df214854ca785dd2696b65672b49e95c4e3eace3ea710dbb585074

  • Size

    1.5MB

  • Sample

    210926-ydbvaafbhj

  • MD5

    3ae6ec68f3e638dbe95e8add90246a27

  • SHA1

    ca649baf490a8828ccc5c1f61cba0ae9fce8c7f3

  • SHA256

    4d7309d129df214854ca785dd2696b65672b49e95c4e3eace3ea710dbb585074

  • SHA512

    374704be9c499befdf1e5519a65b8a572e156e1a41203e82ccef284d94cc44f58c72ca080850ea97bddfcc381e167accff3f1dd6c2424cc17c7502a14201a09e

Score
10/10

Malware Config

Targets

    • Target

      4d7309d129df214854ca785dd2696b65672b49e95c4e3eace3ea710dbb585074

    • Size

      1.5MB

    • MD5

      3ae6ec68f3e638dbe95e8add90246a27

    • SHA1

      ca649baf490a8828ccc5c1f61cba0ae9fce8c7f3

    • SHA256

      4d7309d129df214854ca785dd2696b65672b49e95c4e3eace3ea710dbb585074

    • SHA512

      374704be9c499befdf1e5519a65b8a572e156e1a41203e82ccef284d94cc44f58c72ca080850ea97bddfcc381e167accff3f1dd6c2424cc17c7502a14201a09e

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks