General
-
Target
cfd32b9d972a6dd677990f9e046546526bf4ca333c5f2499050ba1109a109e3b
-
Size
855KB
-
Sample
211024-jv8g9aedgl
-
MD5
c9332cd24128e3913d4f3d155ed5035d
-
SHA1
18e905cafd89c2601291a4a2bf4726a5ef969a8c
-
SHA256
cfd32b9d972a6dd677990f9e046546526bf4ca333c5f2499050ba1109a109e3b
-
SHA512
fe1ced3130be27b3b03a2ee511b3ec753aea4a343acc12b272c8fe81b33c7e5633e78f7ada555c7c6b84dacd6721b11fbad0daec16810d6e16f93f3ae519a1fd
Static task
static1
Behavioral task
behavioral1
Sample
cfd32b9d972a6dd677990f9e046546526bf4ca333c5f2499050ba1109a109e3b.exe
Resource
win10-en-20211014
Malware Config
Extracted
vidar
41.5
517
https://mas.to/@xeroxxx
-
profile_id
517
Extracted
djvu
http://rlrz.org/lancer
Targets
-
-
Target
cfd32b9d972a6dd677990f9e046546526bf4ca333c5f2499050ba1109a109e3b
-
Size
855KB
-
MD5
c9332cd24128e3913d4f3d155ed5035d
-
SHA1
18e905cafd89c2601291a4a2bf4726a5ef969a8c
-
SHA256
cfd32b9d972a6dd677990f9e046546526bf4ca333c5f2499050ba1109a109e3b
-
SHA512
fe1ced3130be27b3b03a2ee511b3ec753aea4a343acc12b272c8fe81b33c7e5633e78f7ada555c7c6b84dacd6721b11fbad0daec16810d6e16f93f3ae519a1fd
-
Detected Djvu ransomware
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-