General

  • Target

    c56b758f00562948de9cac375422074c.exe

  • Size

    382KB

  • Sample

    230307-rmaj9ahg5s

  • MD5

    c56b758f00562948de9cac375422074c

  • SHA1

    9f98c4c403b98aea3624d905b2e1ccbe5939c908

  • SHA256

    3df572ecd8ad88b1b744adc3323998b64d8303ef1a19eba3d7fd6e76aeb67532

  • SHA512

    a77a22431ccfd7e565639d90b205ff7132ddfc39a1d46c8ff5de8f71265c56706230b569fb22a72dbc6bbc7c92688ebb024b167971d3b7859c8b6b01ad9084fa

  • SSDEEP

    6144:qdIjLWKjRaNPXd5G3KpR0JjKXV+3rQqkuWZgdVlVZ/X36qfAk:gQ6KjRYPX/G3KoJCMZFpa

Malware Config

Targets

    • Target

      c56b758f00562948de9cac375422074c.exe

    • Size

      382KB

    • MD5

      c56b758f00562948de9cac375422074c

    • SHA1

      9f98c4c403b98aea3624d905b2e1ccbe5939c908

    • SHA256

      3df572ecd8ad88b1b744adc3323998b64d8303ef1a19eba3d7fd6e76aeb67532

    • SHA512

      a77a22431ccfd7e565639d90b205ff7132ddfc39a1d46c8ff5de8f71265c56706230b569fb22a72dbc6bbc7c92688ebb024b167971d3b7859c8b6b01ad9084fa

    • SSDEEP

      6144:qdIjLWKjRaNPXd5G3KpR0JjKXV+3rQqkuWZgdVlVZ/X36qfAk:gQ6KjRYPX/G3KoJCMZFpa

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks