General
-
Target
pa1reui4zmqkzf1.exe
-
Size
5.5MB
-
Sample
200218-gfcrywzt8j
-
MD5
faba8d1f0a1c89d9bde654edb128da56
-
SHA1
c64d7afcfd3605acc7ff3ce8959f7976c0de437b
-
SHA256
7c0f865eb289347327a93774d91a5154cfdaf5e3a31318bedf5024463bcac4eb
-
SHA512
73a35c72783ea3c13228116efca8fde220271e4dbd73c19834ae97dacc91df528e432e4daa25b1bd8bda680b534929054c2bb7b57d9f5be119d2b00b65f70a25
Static task
static1
Behavioral task
behavioral1
Sample
pa1reui4zmqkzf1.exe
Resource
win7v200217
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
raccoon
89379f5371f470435351b0d002d50f28a65fff02
http://104.155.44.42/gate/log.php
-
url4cnc
https://drive.google.com/uc?export=download&id=1jN5ZmsLRZEQEtxsUIIVXnSOKaqBdnX6Z
Targets
-
-
Target
pa1reui4zmqkzf1.exe
-
Size
5.5MB
-
MD5
faba8d1f0a1c89d9bde654edb128da56
-
SHA1
c64d7afcfd3605acc7ff3ce8959f7976c0de437b
-
SHA256
7c0f865eb289347327a93774d91a5154cfdaf5e3a31318bedf5024463bcac4eb
-
SHA512
73a35c72783ea3c13228116efca8fde220271e4dbd73c19834ae97dacc91df528e432e4daa25b1bd8bda680b534929054c2bb7b57d9f5be119d2b00b65f70a25
-
Loads dropped DLL
-
Program crash
-
Checks for installed software on the system
-
Reads browser user data or profiles (possible credential harvesting)
-
Suspicious use of SetThreadContext
-