General
-
Target
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55
-
Size
1.4MB
-
Sample
200218-d77byp4zee
-
MD5
348f0076f012ff2394b7c1c21dc91876
-
SHA1
0cf8cfde66b6e6c1cbf64e1fe0a29dc56dec961b
-
SHA256
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55
-
SHA512
37268bb8a9dc25365867819bd384239a1db5b8d35a3e3fbcc851400eb4b1e557b48adc7151d83ca0f073f814a0749a71c6dce2fc88dabbc542c24f230acff8c7
Static task
static1
Behavioral task
behavioral1
Sample
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55.exe
Resource
win7v200217
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\machineinfo.txt
raccoon
Extracted
raccoon
316ff478595e2db6ecc2380dc0039736dea133bc
http://34.76.55.103/gate/log.php
-
url4cnc
https://drive.google.com/uc?export=download&id=1Bi_uNdZ2iSQljAb5TSljuYV1vp5edk1X
Extracted
C:\Users\Admin\AppData\Local\Temp\machineinfo.txt
raccoon
Targets
-
-
Target
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55
-
Size
1.4MB
-
MD5
348f0076f012ff2394b7c1c21dc91876
-
SHA1
0cf8cfde66b6e6c1cbf64e1fe0a29dc56dec961b
-
SHA256
b67e506c5b8f79ad835ffe9ca039d2bf3109d10676e832c2da761b8714657a55
-
SHA512
37268bb8a9dc25365867819bd384239a1db5b8d35a3e3fbcc851400eb4b1e557b48adc7151d83ca0f073f814a0749a71c6dce2fc88dabbc542c24f230acff8c7
-
Loads dropped DLL
-
Checks for installed software on the system
-
Reads browser user data or profiles (possible credential harvesting)
-
Suspicious use of SetThreadContext
-