General
-
Target
2025-02-27_93e46ab61e8d5002ac6b6a81820de9d5_mafia_ramnit
-
Size
922KB
-
Sample
250227-hv4zdszsbt
-
MD5
93e46ab61e8d5002ac6b6a81820de9d5
-
SHA1
bb28e2b1e2625de957f538a2b383870298eceb6e
-
SHA256
128c27b6f1a779ee6f4c09b6b4199a1f4dcd0add5e56509370ad8093d6ccec1a
-
SHA512
15f55fb724de989522851d6ea66d5cc9388565ef28a7689ca5b944f0b50f50ed33219eb109d4935f904f8d715a12167e8b24afc719aab4eeaa4a8667f76464c4
-
SSDEEP
12288:cnKLeSOUbeP3Dc3wOZAaSKq89Ij07qVJZiKZO1xqd7JNEyTczBCQ+euSPxKE0INB:6Tc3wOya5dijyKJTZogd7JSb+f03gYr
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-27_93e46ab61e8d5002ac6b6a81820de9d5_mafia_ramnit.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
10.8
http://idgent.top/
Targets
-
-
Target
2025-02-27_93e46ab61e8d5002ac6b6a81820de9d5_mafia_ramnit
-
Size
922KB
-
MD5
93e46ab61e8d5002ac6b6a81820de9d5
-
SHA1
bb28e2b1e2625de957f538a2b383870298eceb6e
-
SHA256
128c27b6f1a779ee6f4c09b6b4199a1f4dcd0add5e56509370ad8093d6ccec1a
-
SHA512
15f55fb724de989522851d6ea66d5cc9388565ef28a7689ca5b944f0b50f50ed33219eb109d4935f904f8d715a12167e8b24afc719aab4eeaa4a8667f76464c4
-
SSDEEP
12288:cnKLeSOUbeP3Dc3wOZAaSKq89Ij07qVJZiKZO1xqd7JNEyTczBCQ+euSPxKE0INB:6Tc3wOya5dijyKJTZogd7JSb+f03gYr
-
Ramnit family
-
Vidar family
-
Vidar Stealer
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-