General

  • Target

    ea9265755d728129e8ef4f75be1e469c736e00d56855efc83e51bff2f6e1cb6d

  • Size

    1.5MB

  • Sample

    210927-bspy5afdcr

  • MD5

    10f2cc4211abbe1c14de7f5f9f875535

  • SHA1

    db4f00bedb52ec5c9460cf863418f289ad0c292b

  • SHA256

    ea9265755d728129e8ef4f75be1e469c736e00d56855efc83e51bff2f6e1cb6d

  • SHA512

    2de9496ce7c5ebee94cee10ae2996974759ae71da28f234011793905d17c275a4c5a5b7b018e1a0eba94ea72e29ba36677b4f23f6246c22d1a97274d2c17a4db

Score
10/10

Malware Config

Targets

    • Target

      ea9265755d728129e8ef4f75be1e469c736e00d56855efc83e51bff2f6e1cb6d

    • Size

      1.5MB

    • MD5

      10f2cc4211abbe1c14de7f5f9f875535

    • SHA1

      db4f00bedb52ec5c9460cf863418f289ad0c292b

    • SHA256

      ea9265755d728129e8ef4f75be1e469c736e00d56855efc83e51bff2f6e1cb6d

    • SHA512

      2de9496ce7c5ebee94cee10ae2996974759ae71da28f234011793905d17c275a4c5a5b7b018e1a0eba94ea72e29ba36677b4f23f6246c22d1a97274d2c17a4db

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks