General

  • Target

    68bf623fb00d4f98711db0bd01e45d31ad05a92159bcf3426c4e6a939a12fe29

  • Size

    1.5MB

  • Sample

    210927-bzcx5sfddk

  • MD5

    15462f2d88e12771bb9df7db79cf10cc

  • SHA1

    2bf501cc8a1faba634da59dc38980f5e71a087cc

  • SHA256

    68bf623fb00d4f98711db0bd01e45d31ad05a92159bcf3426c4e6a939a12fe29

  • SHA512

    d1c8be26132d7024b332961211d95290456b1ad570d4fd6e1c144fd0f43c41b57984f0ce13ba4799e4effed02c96b0296f6063d8889e456477e9c2f5e67ebf64

Score
10/10

Malware Config

Targets

    • Target

      68bf623fb00d4f98711db0bd01e45d31ad05a92159bcf3426c4e6a939a12fe29

    • Size

      1.5MB

    • MD5

      15462f2d88e12771bb9df7db79cf10cc

    • SHA1

      2bf501cc8a1faba634da59dc38980f5e71a087cc

    • SHA256

      68bf623fb00d4f98711db0bd01e45d31ad05a92159bcf3426c4e6a939a12fe29

    • SHA512

      d1c8be26132d7024b332961211d95290456b1ad570d4fd6e1c144fd0f43c41b57984f0ce13ba4799e4effed02c96b0296f6063d8889e456477e9c2f5e67ebf64

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks