General

  • Target

    ba9161ce0bff0251c559b9101399e5a47366e47eba02b58560ef4aba528b512e

  • Size

    1.5MB

  • Sample

    210926-zf1f4afccq

  • MD5

    be1caab1917f18e9fd1528964c17463a

  • SHA1

    5faa3398d98c728c00841015dfc48afd7a5d1ca8

  • SHA256

    ba9161ce0bff0251c559b9101399e5a47366e47eba02b58560ef4aba528b512e

  • SHA512

    8aac4c98a065ef177ca9791b96a068d9c65d95b87f7f0c3b32e5fe86868e08e0a95ce9f4b9d475e1aafae5061431c2f6491b2664a1540e2341834a473db26788

Score
10/10

Malware Config

Targets

    • Target

      ba9161ce0bff0251c559b9101399e5a47366e47eba02b58560ef4aba528b512e

    • Size

      1.5MB

    • MD5

      be1caab1917f18e9fd1528964c17463a

    • SHA1

      5faa3398d98c728c00841015dfc48afd7a5d1ca8

    • SHA256

      ba9161ce0bff0251c559b9101399e5a47366e47eba02b58560ef4aba528b512e

    • SHA512

      8aac4c98a065ef177ca9791b96a068d9c65d95b87f7f0c3b32e5fe86868e08e0a95ce9f4b9d475e1aafae5061431c2f6491b2664a1540e2341834a473db26788

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks