General
-
Target
usfive_20210702-192138
-
Size
478KB
-
Sample
210702-arqgfsceq6
-
MD5
a72fbbe3a7d5a04db51f223d506f03ec
-
SHA1
eff774728ed867c29a48deeac1a3b68462b303ed
-
SHA256
52360c0e4a8a0b15142e84efc054178f40b2ed0229a851cff5dfc643497a308a
-
SHA512
51eecb7d12094122e6bcd19ad0d65dadd0af98f619df84422348bc993afc7342a7f59d345d67de793d130e154b71ca781df95c80d2aec727fbc1f369bf9ee01d
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210702-192138.exe
Resource
win7v20210410
Malware Config
Extracted
raccoon
7ea5512058d479def2eeb58bd2231423ad2fdf37
-
url4cnc
https://telete.in/h_electricryptors2
Targets
-
-
Target
usfive_20210702-192138
-
Size
478KB
-
MD5
a72fbbe3a7d5a04db51f223d506f03ec
-
SHA1
eff774728ed867c29a48deeac1a3b68462b303ed
-
SHA256
52360c0e4a8a0b15142e84efc054178f40b2ed0229a851cff5dfc643497a308a
-
SHA512
51eecb7d12094122e6bcd19ad0d65dadd0af98f619df84422348bc993afc7342a7f59d345d67de793d130e154b71ca781df95c80d2aec727fbc1f369bf9ee01d
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
DarkVNC Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-