General

  • Target

    ec09b5c70a5457cafaf12f43c239f91c250f85150af53ef88cc587a1b35a5e3c

  • Size

    856KB

  • Sample

    211024-zmzs5sfbh8

  • MD5

    65775c0cd7aa267f928e6b141eeef80d

  • SHA1

    d30ce7eecb5389d86bd5c95be7a2cb84dee3caa2

  • SHA256

    ec09b5c70a5457cafaf12f43c239f91c250f85150af53ef88cc587a1b35a5e3c

  • SHA512

    e232ac59c70fbfbda3148883a0a46aa26ba365f1346d32a662005313f0e8e5f144a62add364a5c96f13a9cfdab4841550b66ae1fbe1872f086200b2ee20e3322

Malware Config

Extracted

Family

vidar

Version

41.5

Botnet

517

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    517

Extracted

Family

djvu

C2

http://rlrz.org/fhsgtsspen6

Targets

    • Target

      ec09b5c70a5457cafaf12f43c239f91c250f85150af53ef88cc587a1b35a5e3c

    • Size

      856KB

    • MD5

      65775c0cd7aa267f928e6b141eeef80d

    • SHA1

      d30ce7eecb5389d86bd5c95be7a2cb84dee3caa2

    • SHA256

      ec09b5c70a5457cafaf12f43c239f91c250f85150af53ef88cc587a1b35a5e3c

    • SHA512

      e232ac59c70fbfbda3148883a0a46aa26ba365f1346d32a662005313f0e8e5f144a62add364a5c96f13a9cfdab4841550b66ae1fbe1872f086200b2ee20e3322

    • Detected Djvu ransomware

    • Djvu Ransomware

      Ransomware which is a variant of the STOP family.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks