General

  • Target

    identifier

  • Size

    154KB

  • Sample

    230330-mxmv4scc67

  • MD5

    207926f921a9e384221e100c3283ef3f

  • SHA1

    7ee523ab5f66690004fb7142d3ec4699b0739873

  • SHA256

    a5f6ffc8f2ca33775b1abb8d140de4bfbe6b7d39f8e928cb4657394ceed0867a

  • SHA512

    7b6fc00f75cbc73f1a5cfb38475c5305e226204329cd30c7c898ea423a164f0cbd2a060931fc8a4f1147e5c0db6deec7ffd2aead75b1938584520393fcc2a447

  • SSDEEP

    3072:qgjEfVGE+GoP3kJ6UkF2JARbmaBYHbUP+lCM:qgCVGE+GoPz8j8YW0

Malware Config

Targets

    • Target

      identifier

    • Size

      154KB

    • MD5

      207926f921a9e384221e100c3283ef3f

    • SHA1

      7ee523ab5f66690004fb7142d3ec4699b0739873

    • SHA256

      a5f6ffc8f2ca33775b1abb8d140de4bfbe6b7d39f8e928cb4657394ceed0867a

    • SHA512

      7b6fc00f75cbc73f1a5cfb38475c5305e226204329cd30c7c898ea423a164f0cbd2a060931fc8a4f1147e5c0db6deec7ffd2aead75b1938584520393fcc2a447

    • SSDEEP

      3072:qgjEfVGE+GoP3kJ6UkF2JARbmaBYHbUP+lCM:qgCVGE+GoPz8j8YW0

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks