General
-
Target
864caa3b81740d39b069b9cbb2e67d31
-
Size
1.9MB
-
Sample
200212-2wp4qpsxd2
-
MD5
864caa3b81740d39b069b9cbb2e67d31
-
SHA1
bdbf23ef85d6f0ead1482f2c06ea9dcc9f9bda53
-
SHA256
32f98310a458d19c44263eb456e19ee2d6d16a3d096d9416596c7f24eb0d3074
-
SHA512
b7a297e4486e17f141fdd45922a74fa4939c3172c8fc54ff91c8489e02cd658f9ede3a98c65e33b9d48ab4e40a867372e6b7407134734160c56bfb172a98e462
Static task
static1
Behavioral task
behavioral1
Sample
864caa3b81740d39b069b9cbb2e67d31.exe
Resource
win7v191014
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
raccoon
ee29149280396bb8bfd2a331aa61b6bca42540c7
http://34.76.55.103/gate/log.php
-
url4cnc
https://drive.google.com/uc?export=download&id=10rzaNoF7YXiRpeyiHdkSdciNDW4V5jrc
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
864caa3b81740d39b069b9cbb2e67d31
-
Size
1.9MB
-
MD5
864caa3b81740d39b069b9cbb2e67d31
-
SHA1
bdbf23ef85d6f0ead1482f2c06ea9dcc9f9bda53
-
SHA256
32f98310a458d19c44263eb456e19ee2d6d16a3d096d9416596c7f24eb0d3074
-
SHA512
b7a297e4486e17f141fdd45922a74fa4939c3172c8fc54ff91c8489e02cd658f9ede3a98c65e33b9d48ab4e40a867372e6b7407134734160c56bfb172a98e462
-
Deletes itself
-
Loads dropped DLL
-
Checks for installed software on the system
-
Reads browser user data or profiles (possible credential harvesting)
-
Suspicious use of SetThreadContext
-