General
-
Target
4cf49277973770f7ce0152cb5bdf365d3d869af696e853b81227faa2563735f8
-
Size
780KB
-
Sample
211020-3vqrzsaegn
-
MD5
3bdbed763b9c2e59de7c6989368f30c1
-
SHA1
013ed29f4c45dd844726a270b27e7d664ee15223
-
SHA256
4cf49277973770f7ce0152cb5bdf365d3d869af696e853b81227faa2563735f8
-
SHA512
6eecd47a437bac2af4d2392588844900e6b3f5d0225729d43c37b42dfbcede14abd9866c725da4fa9f6e1f9fcefb1db6f3d188c7e852ae80d2b4d5caed5991b5
Static task
static1
Behavioral task
behavioral1
Sample
4cf49277973770f7ce0152cb5bdf365d3d869af696e853b81227faa2563735f8.exe
Resource
win10-en-20211014
Malware Config
Extracted
vidar
41.5
517
https://mas.to/@xeroxxx
-
profile_id
517
Extracted
djvu
http://rlrz.org/fhsgtsspen6
Targets
-
-
Target
4cf49277973770f7ce0152cb5bdf365d3d869af696e853b81227faa2563735f8
-
Size
780KB
-
MD5
3bdbed763b9c2e59de7c6989368f30c1
-
SHA1
013ed29f4c45dd844726a270b27e7d664ee15223
-
SHA256
4cf49277973770f7ce0152cb5bdf365d3d869af696e853b81227faa2563735f8
-
SHA512
6eecd47a437bac2af4d2392588844900e6b3f5d0225729d43c37b42dfbcede14abd9866c725da4fa9f6e1f9fcefb1db6f3d188c7e852ae80d2b4d5caed5991b5
-
Detected Djvu ransomware
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-