General
-
Target
wotsuper2.exe
-
Size
1.9MB
-
Sample
200218-5t7dbcct6n
-
MD5
864caa3b81740d39b069b9cbb2e67d31
-
SHA1
bdbf23ef85d6f0ead1482f2c06ea9dcc9f9bda53
-
SHA256
32f98310a458d19c44263eb456e19ee2d6d16a3d096d9416596c7f24eb0d3074
-
SHA512
b7a297e4486e17f141fdd45922a74fa4939c3172c8fc54ff91c8489e02cd658f9ede3a98c65e33b9d48ab4e40a867372e6b7407134734160c56bfb172a98e462
Static task
static1
Behavioral task
behavioral1
Sample
wotsuper2.exe
Resource
win7v200217
Behavioral task
behavioral2
Sample
wotsuper2.exe
Resource
win10v200217
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
raccoon
ee29149280396bb8bfd2a331aa61b6bca42540c7
http://34.76.55.103/gate/log.php
-
url4cnc
https://drive.google.com/uc?export=download&id=10rzaNoF7YXiRpeyiHdkSdciNDW4V5jrc
Targets
-
-
Target
wotsuper2.exe
-
Size
1.9MB
-
MD5
864caa3b81740d39b069b9cbb2e67d31
-
SHA1
bdbf23ef85d6f0ead1482f2c06ea9dcc9f9bda53
-
SHA256
32f98310a458d19c44263eb456e19ee2d6d16a3d096d9416596c7f24eb0d3074
-
SHA512
b7a297e4486e17f141fdd45922a74fa4939c3172c8fc54ff91c8489e02cd658f9ede3a98c65e33b9d48ab4e40a867372e6b7407134734160c56bfb172a98e462
-
Deletes itself
-
Loads dropped DLL
-
Checks for installed software on the system
-
Reads browser user data or profiles (possible credential harvesting)
-
Suspicious use of SetThreadContext
-