General
-
Target
b726f090cc523eaa9861ca0c9a748493.exe
-
Size
321KB
-
Sample
200628-5kskczhw6e
-
MD5
b726f090cc523eaa9861ca0c9a748493
-
SHA1
d25b0174d8a9ab1eea1b8b0726b5fccfbfc8b918
-
SHA256
3e9f05acde528ea5fd7ca9d0c2af0e82d29e343d2f61420290e6f660630cd25f
-
SHA512
14517b245119ff4a4fd8a618c1586c12e57dfa44caa3dfd23341107ce39bc785898f713a56f5f760f3b658fbf51bde851a68737fe9d36a8b2dcdfadd66c32eee
Static task
static1
Behavioral task
behavioral1
Sample
b726f090cc523eaa9861ca0c9a748493.exe
Resource
win7
Behavioral task
behavioral2
Sample
b726f090cc523eaa9861ca0c9a748493.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
oski
ademg.ug
Extracted
azorult
http://195.245.112.115/index.php
Extracted
raccoon
ad27fba1502405da37198363b1a8548a7796684b
-
url4cnc
https://telete.in/jrikitiki
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
b726f090cc523eaa9861ca0c9a748493.exe
-
Size
321KB
-
MD5
b726f090cc523eaa9861ca0c9a748493
-
SHA1
d25b0174d8a9ab1eea1b8b0726b5fccfbfc8b918
-
SHA256
3e9f05acde528ea5fd7ca9d0c2af0e82d29e343d2f61420290e6f660630cd25f
-
SHA512
14517b245119ff4a4fd8a618c1586c12e57dfa44caa3dfd23341107ce39bc785898f713a56f5f760f3b658fbf51bde851a68737fe9d36a8b2dcdfadd66c32eee
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-