General
-
Target
Picricbi9.exe
-
Size
56KB
-
Sample
200304-pnc6qe8g5a
-
MD5
a1ce8f334c7adb638ca7c10e53310579
-
SHA1
de6adcfe94b557fa7a53f855deebd81abf023d8c
-
SHA256
35bc6702bcdafc4faab3b776279c2a3eec23f1290193fc5c416b94d1a07a051e
-
SHA512
3b30435d47a90fe1d0fe21169b8f742d17ddefb0160ceaece72d4db7ef9a1c08d3daa842dd5de958337642407b097638f23da7b883ce59a49d96a9380b41f742
Static task
static1
Behavioral task
behavioral1
Sample
Picricbi9.exe
Resource
win7v200217
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
Picricbi9.exe
-
Size
56KB
-
MD5
a1ce8f334c7adb638ca7c10e53310579
-
SHA1
de6adcfe94b557fa7a53f855deebd81abf023d8c
-
SHA256
35bc6702bcdafc4faab3b776279c2a3eec23f1290193fc5c416b94d1a07a051e
-
SHA512
3b30435d47a90fe1d0fe21169b8f742d17ddefb0160ceaece72d4db7ef9a1c08d3daa842dd5de958337642407b097638f23da7b883ce59a49d96a9380b41f742
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-