General
-
Target
4wvbd5ykxwfxg.exe
-
Size
5.5MB
-
Sample
200218-rp1t7sna5e
-
MD5
45a02b429739d0d3c02e972ec3964eb1
-
SHA1
2842b9f8f61c85543545946973b4b750b070fde1
-
SHA256
82214d13917ce35d7a08d47bcd2a053ad385d1f13fed5d06507eeb9471c918b2
-
SHA512
fded983fdf09401ce0f2633e9dd55623692dc4b29d49ebf49bffabd76e009f8946eb8a35ce2cfcfb5eec5542010229e66ce6fd38b9bae6f82ccc6d5510ae7562
Static task
static1
Behavioral task
behavioral1
Sample
4wvbd5ykxwfxg.exe
Resource
win7v200217
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
raccoon
89379f5371f470435351b0d002d50f28a65fff02
http://104.155.44.42/gate/log.php
-
url4cnc
https://drive.google.com/uc?export=download&id=1jN5ZmsLRZEQEtxsUIIVXnSOKaqBdnX6Z
Targets
-
-
Target
4wvbd5ykxwfxg.exe
-
Size
5.5MB
-
MD5
45a02b429739d0d3c02e972ec3964eb1
-
SHA1
2842b9f8f61c85543545946973b4b750b070fde1
-
SHA256
82214d13917ce35d7a08d47bcd2a053ad385d1f13fed5d06507eeb9471c918b2
-
SHA512
fded983fdf09401ce0f2633e9dd55623692dc4b29d49ebf49bffabd76e009f8946eb8a35ce2cfcfb5eec5542010229e66ce6fd38b9bae6f82ccc6d5510ae7562
-
Loads dropped DLL
-
Program crash
-
Checks for installed software on the system
-
Reads browser user data or profiles (possible credential harvesting)
-
Suspicious use of SetThreadContext
-