Analysis
-
max time network
113s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
03-06-2021 16:36
Static task
static1
Behavioral task
behavioral1
Sample
9d8c7ac5f187791b701c916c35911821.exe
Resource
win7v20210408
raccoonservhelper89ac909b803bacbc6cc523520599c4b9c029b033backdoordiscoveryexploitpersistencespywarestealertrojanupx
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
9d8c7ac5f187791b701c916c35911821.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
9d8c7ac5f187791b701c916c35911821.exe
-
Size
567KB
-
MD5
9d8c7ac5f187791b701c916c35911821
-
SHA1
aeaad2abdb996190fe24e6af8a8eac355572dcf2
-
SHA256
0d6e106e13ca046d0f19c9d0e9542f9142c5a9172b2cf9e2e764519f72514d9b
-
SHA512
249c5c832029369d896aa430835c9892ab94e8b0fd0337b80b57116e316fe441dd49e8752ffbf20b0470f1b1ad47a8963bc4685e1b26d9b7c342476eb4e9e506
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 23 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 25 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)