Kaspersky discovers new Ymir ransomware used together with RustyStealer
Common Information
Type Value
UUID c9ee5788-ed03-43f0-8987-27b184f09b43
Fingerprint b41438e329390608
Analysis status DONE
Considered CTI value 2
Text language
Published Nov. 11, 2024, 10 a.m.
Added to db Nov. 11, 2024, 11:15 a.m.
Last updated Nov. 17, 2024, 7:44 p.m.
Headline Ymir: new stealthy ransomware in the wild
Title Kaspersky discovers new Ymir ransomware used together with RustyStealer
Detected Hints/Tags/Attributes 108/3/47
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 223 Securelist https://securelist.com/feed/ 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 4127
github.com
Details Domain 3
trojan.msil.dnoper.sb
Details File 4
setup-qtox-x86_64-release.exe
Details File 6
incident_report.pdf
Details File 533
ntdll.dll
Details File 25
cryptsp.dll
Details File 12
rsaenh.dll
Details File 52
bcrypt.dll
Details File 82
kernelbase.dll
Details File 1208
powershell.exe
Details File 137
conhost.exe
Details File 80
msvcrt.dll
Details File 108
0.exe
Details File 18
1.ps1
Details File 73
trojan.msi
Details File 7
advanced_ip_scanner.exe
Details File 7
39-setup.exe
Details md5 3
12acbb05741a218a1c83eaa1cfc2401f
Details md5 5
5ee1befc69d120976a60a97d3254e9eb
Details md5 5
5384d704fadf229d08eab696404cbba6
Details md5 5
39df773139f505657d11749804953be5
Details sha1 5
3648359ebae8ce7cacae1e631103659f5a8c630e
Details sha1 3
e6c4d3e360a705e272ae0b505e58e3d928fb1387
Details sha1 2
8287d54c83db03b8adcdf1409f5d1c9abb1693ac
Details sha1 5
fe6de75d6042de714c28c0a3c0816b37e0fa4bb3
Details sha1 5
f954d1b1d13a5e4f62f108c9965707a2aa2a3c89
Details sha256 3
cb88edd192d49db12f444f764c3bdc287703666167a4ca8d533d51f86ba428d8
Details sha256 5
8287d54c83db03b8adcdf1409f5d1c9abb1693ac8d000b5ae75b3a296cb3061c
Details sha256 5
51ffc0b7358b7611492ef458fdf9b97f121e49e70f86a6b53b93ed923b707a03
Details sha256 5
b087e1309f3eab6302d7503079af1ad6af06d70a932f7a6ae1421b942048e28a
Details IPv4 5
74.50.84.181
Details IPv4 5
94.158.244.69
Details IPv4 5
85.239.61.60
Details IPv4 5
5.255.117.134
Details MITRE ATT&CK Techniques 585
T1083
Details MITRE ATT&CK Techniques 1006
T1082
Details MITRE ATT&CK Techniques 460
T1059.001
Details MITRE ATT&CK Techniques 472
T1486
Details MITRE ATT&CK Techniques 57
T1497.003
Details MITRE ATT&CK Techniques 297
T1070.004
Details MITRE ATT&CK Techniques 433
T1057
Details MITRE ATT&CK Techniques 120
T1129
Details MITRE ATT&CK Techniques 627
T1027
Details Url 4
https://github.com/qtox/qtox/releases/download/v1.17.6/setup-qtox-x86_64-release.exe
Details Windows Registry Key 188
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Details Windows Registry Key 98
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Details Yara rule 3
import "pe"

rule Ymir {
	meta:
		author = "Kaspersky - GERT"
		description = "Yara rule for detecting the Ymir ransomware."
		target_entity = "file"
	strings:
		$s1 = "powershell -w h -c Start-Sleep -Seconds 5; Remove-Item -Force -Path" ascii wide nocase
		$s2 = "setup-qtox-x86_64-release.exe" ascii wide nocase
		$s3 = "6C5oy2dVr6" ascii wide nocase
		$s4 = "INCIDENT_REPORT.pdf" ascii wide nocase
		$s5 = "D:20240831154833-06" ascii wide nocase
		$s6 = "ChaCha" ascii wide nocase
		$s7 = "x64dbg" ascii wide nocase
	condition:
		(3 of ($s*)) and pe.imports("msvcrt.dll", "memmove")
}