Resubmissions
14-03-2021 10:17
210314-fsh5gvfbqx 1031-10-2020 16:07
201031-jhx64f88en 1001-10-2020 20:46
201001-nyhbt4p25j 1001-10-2020 20:45
201001-c3xkyk1ytn 1001-10-2020 20:43
201001-j5wlprfb6a 1023-09-2020 09:23
200923-31plnbj8kx 1007-09-2020 15:39
200907-ttv28yxx3e 1007-09-2020 15:39
200907-n38qzysfy6 1007-09-2020 15:38
200907-9llegynkjx 1007-09-2020 15:31
200907-3xqj79j9gx 10General
-
Target
Keygen.exe
-
Size
849KB
-
Sample
200907-ttv28yxx3e
-
MD5
dbde61502c5c0e17ebc6919f361c32b9
-
SHA1
189749cf0b66a9f560b68861f98c22cdbcafc566
-
SHA256
88cad5f9433e50af09ac9cad9db06e9003e85be739060b88b64186c05c0d636b
-
SHA512
d9b8537f05844ec2f2549e2049e967a8023bfe432e3a9cf25fc0f7ad720e57a5830be733e1812cc806c5b68cd9586a031e394f67fc7e3f7fe390625fd5dedfbb
Static task
static1
Behavioral task
behavioral1
Sample
Keygen.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
Keygen.exe
Resource
win10v200722
Malware Config
Extracted
http://pdshcjvnv.ug/zxcvb.exe
http://pdshcjvnv.ug/zxcvb.exe
Extracted
http://bit.do/fqhJv
http://bit.do/fqhJv
Extracted
http://zxvbcrt.ug/zxcvb.exe
http://zxvbcrt.ug/zxcvb.exe
Extracted
http://bit.do/fqhHT
http://bit.do/fqhHT
Extracted
http://bit.do/fqhJD
http://bit.do/fqhJD
Extracted
http://rbcxvnb.ug/zxcvb.exe
http://rbcxvnb.ug/zxcvb.exe
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
azorult
http://195.245.112.115/index.php
Extracted
raccoon
d58ee081e4d259676e5c18189c82f5356e64ec30
-
url4cnc
https://telete.in/brikitiki
Extracted
oski
courtneysdv.ac.ug
Targets
-
-
Target
Keygen.exe
-
Size
849KB
-
MD5
dbde61502c5c0e17ebc6919f361c32b9
-
SHA1
189749cf0b66a9f560b68861f98c22cdbcafc566
-
SHA256
88cad5f9433e50af09ac9cad9db06e9003e85be739060b88b64186c05c0d636b
-
SHA512
d9b8537f05844ec2f2549e2049e967a8023bfe432e3a9cf25fc0f7ad720e57a5830be733e1812cc806c5b68cd9586a031e394f67fc7e3f7fe390625fd5dedfbb
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
ModiLoader First Stage
-
ModiLoader Second Stage
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-