General

  • Target

    410e80ef6b4c08b79415c9bdab170383797fab7881367d326e1095fe31d570e4

  • Size

    857KB

  • Sample

    211025-dxvraafec3

  • MD5

    da7d69229aaa7ee4b1e388961e1ae7f0

  • SHA1

    ca60a0071655092850d0f7826a7ce6fd6af82cac

  • SHA256

    410e80ef6b4c08b79415c9bdab170383797fab7881367d326e1095fe31d570e4

  • SHA512

    7d9b8f017c17f9ae9244e6c8bdb93cccb3191734a9be51c183006e2eb16e2a460e70ecac4a01ac664d243cffa7455e20a7fcc0843f722cd1feffb2366a3ed374

Malware Config

Extracted

Family

vidar

Version

41.5

Botnet

517

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    517

Extracted

Family

djvu

C2

http://rlrz.org/fhsgtsspen6

Targets

    • Target

      410e80ef6b4c08b79415c9bdab170383797fab7881367d326e1095fe31d570e4

    • Size

      857KB

    • MD5

      da7d69229aaa7ee4b1e388961e1ae7f0

    • SHA1

      ca60a0071655092850d0f7826a7ce6fd6af82cac

    • SHA256

      410e80ef6b4c08b79415c9bdab170383797fab7881367d326e1095fe31d570e4

    • SHA512

      7d9b8f017c17f9ae9244e6c8bdb93cccb3191734a9be51c183006e2eb16e2a460e70ecac4a01ac664d243cffa7455e20a7fcc0843f722cd1feffb2366a3ed374

    • Detected Djvu ransomware

    • Djvu Ransomware

      Ransomware which is a variant of the STOP family.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks