General
-
Target
01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b
-
Size
722KB
-
Sample
210826-r3j56qpnjj
-
MD5
55c13e0408310276dcb7a5356262a987
-
SHA1
d7d15e0d6298572a83a26ee67bf5488b93cabb05
-
SHA256
01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b
-
SHA512
52ac50b3c74d827dce52d44b2f47fbf24a4f5b9eedb32bb5e1126acf49cfb5bc4946cb4259b868d22b934524b0e84553a8df5b688acee1e750180e014fee27b1
Static task
static1
Behavioral task
behavioral1
Sample
01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b.exe
Resource
win10v20210408
Malware Config
Extracted
C:\_readme.txt
djvu
https://we.tl/t-ykQaS2tRyB
Extracted
vidar
40.1
517
https://eduarroma.tumblr.com/
-
profile_id
517
Targets
-
-
Target
01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b
-
Size
722KB
-
MD5
55c13e0408310276dcb7a5356262a987
-
SHA1
d7d15e0d6298572a83a26ee67bf5488b93cabb05
-
SHA256
01f06c896c957dc5cd9450298c5503b20478b6b8728aed6f903ae7312dff501b
-
SHA512
52ac50b3c74d827dce52d44b2f47fbf24a4f5b9eedb32bb5e1126acf49cfb5bc4946cb4259b868d22b934524b0e84553a8df5b688acee1e750180e014fee27b1
-
Detected Djvu ransomeware
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-