General
-
Target
usfive_20210702-052459
-
Size
517KB
-
Sample
210702-21zfqwdp92
-
MD5
4d96c35ea7bb6f4239c9382771a23a39
-
SHA1
f3497cfa1d27350ec7a6827f94d5f1e1b73f91e8
-
SHA256
d5f30506b8c1e90fd04c2ddf1d8c32a5d1a0cec4679e22948d4f846d25a177a9
-
SHA512
038d0a3463551b14841f368ed0f2f85d2a62fdc344720d7cac25655e4d57035d7fe36910b26e06cb71ccfc516e89ddb316eeabdc0834bf9813c48add0849c562
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210702-052459.exe
Resource
win7v20210408
Malware Config
Extracted
raccoon
7ea5512058d479def2eeb58bd2231423ad2fdf37
-
url4cnc
https://telete.in/h_electricryptors2
Targets
-
-
Target
usfive_20210702-052459
-
Size
517KB
-
MD5
4d96c35ea7bb6f4239c9382771a23a39
-
SHA1
f3497cfa1d27350ec7a6827f94d5f1e1b73f91e8
-
SHA256
d5f30506b8c1e90fd04c2ddf1d8c32a5d1a0cec4679e22948d4f846d25a177a9
-
SHA512
038d0a3463551b14841f368ed0f2f85d2a62fdc344720d7cac25655e4d57035d7fe36910b26e06cb71ccfc516e89ddb316eeabdc0834bf9813c48add0849c562
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
DarkVNC Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-