General
-
Target
91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49
-
Size
721KB
-
Sample
210826-e8sr1erfbn
-
MD5
92baa6d072d591b827950b6bc4730057
-
SHA1
17e968a7d200a75fcec9b6967bd635d8633405d9
-
SHA256
91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49
-
SHA512
21cd5c7c535b333c6e7297f0edb1d03cad96c24114d3318b6943c0af57c81e2486c6056103617222c3c7650ce666945c7fb4080947ae4946219acf229cd3f0da
Static task
static1
Behavioral task
behavioral1
Sample
91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49.exe
Resource
win10v20210408
Malware Config
Extracted
C:\_readme.txt
djvu
https://we.tl/t-ykQaS2tRyB
Extracted
vidar
40.1
517
https://eduarroma.tumblr.com/
-
profile_id
517
Targets
-
-
Target
91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49
-
Size
721KB
-
MD5
92baa6d072d591b827950b6bc4730057
-
SHA1
17e968a7d200a75fcec9b6967bd635d8633405d9
-
SHA256
91e437e7ba475e248127177f79b578bc0f73cd9ec8fd2eb9d380eea88e939f49
-
SHA512
21cd5c7c535b333c6e7297f0edb1d03cad96c24114d3318b6943c0af57c81e2486c6056103617222c3c7650ce666945c7fb4080947ae4946219acf229cd3f0da
-
Detected Djvu ransomeware
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-