General
-
Target
e029107139c27f93a1ad1e718dc27369.exe
-
Size
712KB
-
Sample
210318-q7klqt2js2
-
MD5
e029107139c27f93a1ad1e718dc27369
-
SHA1
060c494bd61498e36a5639fcc5133d0e4ecde636
-
SHA256
9feb26b9550dbf46719374757468d95b6882c00fd3ca65a02e9edf2854e900a9
-
SHA512
b296af96bec07e9e60e8e9d517c05c7bc140ec5b8fdc37dd848656eed03ee4c318227c36cd2efae81ce0b3f27ae54be1a6abf379822c83ca6c935972617ad6d8
Static task
static1
Behavioral task
behavioral1
Sample
e029107139c27f93a1ad1e718dc27369.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
e029107139c27f93a1ad1e718dc27369.exe
Resource
win10v20201028
Malware Config
Extracted
C:\_readme.txt
djvu
https://we.tl/t-NuEqGxqRg2
Extracted
C:\_readme.txt
djvu
https://we.tl/t-NuEqGxqRg2
Targets
-
-
Target
e029107139c27f93a1ad1e718dc27369.exe
-
Size
712KB
-
MD5
e029107139c27f93a1ad1e718dc27369
-
SHA1
060c494bd61498e36a5639fcc5133d0e4ecde636
-
SHA256
9feb26b9550dbf46719374757468d95b6882c00fd3ca65a02e9edf2854e900a9
-
SHA512
b296af96bec07e9e60e8e9d517c05c7bc140ec5b8fdc37dd848656eed03ee4c318227c36cd2efae81ce0b3f27ae54be1a6abf379822c83ca6c935972617ad6d8
-
Detected Djvu ransomeware
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-