MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 384ae82c526406e4becbc020c78a494a0dec9c94183aa3509e29cfff9d838a3a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stop


Vendor detections: 14


Intelligence 14 IOCs YARA 4 File information Comments

SHA256 hash: 384ae82c526406e4becbc020c78a494a0dec9c94183aa3509e29cfff9d838a3a
SHA3-384 hash: 302c79848b90b0542ac5e5d23cc124699e6ce0b10a96bcb699c84c82dbbca46507c9d0399988d107431b63424abb83d8
SHA1 hash: 11ebee64d960f6e1623f2229a8054c4fd0c959e0
MD5 hash: cfcebd84fc850049b8bc80ef547468b2
humanhash: illinois-tennessee-east-cold
File name:384ae82c526406e4becbc020c78a494a0dec9c94183aa3509e29cfff9d838a3a
Download: download sample
Signature Stop
File size:701'440 bytes
First seen:2021-09-13 06:23:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 648d80ab383d01ef3dcdfdac14d78fcd (9 x RaccoonStealer, 2 x RedLineStealer, 1 x Smoke Loader)
ssdeep 12288:21hovPgwFK5ehWNR3poRJM/M7wm5npZUECkftsYawleg3rc:21Ww9YO3povMk7wm5pZqitRF3
Threatray 600 similar samples on MalwareBazaar
TLSH T1B7E4123275F48DB7C5C64A748489D0F07ABF7D119B72A607BB850B9B3EB1280594EB23
dhash icon 4839b2b0e8c38890 (105 x RaccoonStealer, 38 x Smoke Loader, 33 x RedLineStealer)
Reporter JAMESWT_WT
Tags:exe Stop

Intelligence


File Origin
# of uploads :
1
# of downloads :
110
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
384ae82c526406e4becbc020c78a494a0dec9c94183aa3509e29cfff9d838a3a
Verdict:
Suspicious activity
Analysis date:
2021-09-13 06:27:33 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Malware family:
STOP Ransomware
Verdict:
Malicious
Result
Threat name:
Djvu Vidar
Detection:
malicious
Classification:
rans.spre.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found ransom note / readme
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes many files with high entropy
Yara detected Djvu Ransomware
Yara detected Vidar
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 481917 Sample: PQiWhjWvNZ Startdate: 13/09/2021 Architecture: WINDOWS Score: 100 99 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->99 101 Multi AV Scanner detection for domain / URL 2->101 103 Antivirus detection for URL or domain 2->103 105 8 other signatures 2->105 12 PQiWhjWvNZ.exe 2->12         started        15 PQiWhjWvNZ.exe 2->15         started        17 PQiWhjWvNZ.exe 2->17         started        19 PQiWhjWvNZ.exe 2->19         started        process3 signatures4 113 Detected unpacking (changes PE section rights) 12->113 115 Writes many files with high entropy 12->115 117 Injects a PE file into a foreign processes 12->117 21 PQiWhjWvNZ.exe 1 16 12->21         started        25 PQiWhjWvNZ.exe 12 15->25         started        27 svchost.exe 15->27         started        29 PQiWhjWvNZ.exe 17->29         started        31 PQiWhjWvNZ.exe 19->31         started        process5 dnsIp6 77 api.2ip.ua 77.123.139.190, 443, 49736, 49737 VOLIA-ASUA Ukraine 21->77 59 C:\Users\...\PQiWhjWvNZ.exe:Zone.Identifier, ASCII 21->59 dropped 33 PQiWhjWvNZ.exe 21->33         started        36 icacls.exe 21->36         started        79 192.168.2.1 unknown unknown 25->79 file7 process8 signatures9 97 Injects a PE file into a foreign processes 33->97 38 PQiWhjWvNZ.exe 1 20 33->38         started        process10 dnsIp11 81 securebiz.org 197.44.54.172, 49738, 80 TE-ASTE-ASEG Egypt 38->81 83 astdg.top 38->83 85 api.2ip.ua 38->85 61 C:\...\iecompatviewlist[1].xml.lqqw (copy), DOS 38->61 dropped 63 heavy_ad_intervent..._out.db.lqqw (copy), DOS 38->63 dropped 65 C:\Users\user\...\ISO690.XSL.lqqw (copy), COM 38->65 dropped 67 375 other files (355 malicious) 38->67 dropped 107 Infects executable files (exe, dll, sys, html) 38->107 109 Modifies existing user documents (likely ransomware behavior) 38->109 43 build2.exe 38->43         started        file12 signatures13 process14 signatures15 111 Detected unpacking (changes PE section rights) 43->111 46 build2.exe 43->46         started        process16 dnsIp17 87 gheorghip.tumblr.com 74.114.154.22, 443, 49741 AUTOMATTICUS Canada 46->87 89 162.55.179.90, 49742, 80 ACPCA United States 46->89 69 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 46->69 dropped 71 C:\Users\user\AppData\...\freebl3[1].dll, PE32 46->71 dropped 73 C:\Users\user\AppData\...\msvcp140[1].dll, PE32 46->73 dropped 75 9 other files (none is malicious) 46->75 dropped 91 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 46->91 93 Tries to harvest and steal browser information (history, passwords, etc) 46->93 95 Tries to steal Crypto Currency Wallets 46->95 51 cmd.exe 46->51         started        file18 signatures19 process20 process21 53 conhost.exe 51->53         started        55 taskkill.exe 51->55         started        57 timeout.exe 51->57         started       
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-08-29 15:39:28 UTC
File Type:
PE (Exe)
Extracted files:
24
AV detection:
38 of 45 (84.44%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:djvu family:vidar botnet:517 discovery persistence ransomware stealer
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Loads dropped DLL
Modifies file permissions
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Detected Djvu ransomware
Djvu Ransomware
Vidar
Malware Config
C2 Extraction:
https://gheorghip.tumblr.com/
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_STOP
Author:ditekSHen
Description:Detects STOP ransomware
Rule name:SUSP_XORed_URL_in_EXE
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:SUSP_XORed_URL_in_EXE_RID2E46
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:win_stop_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.stop.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments