General
-
Target
usfive_20210702-080246
-
Size
517KB
-
Sample
210702-e7cgz423me
-
MD5
4f8ae6eaf2af7b6063eaad06daeec647
-
SHA1
7ab1a53066ad2ac7d472ad4300f6fc7367e89fb1
-
SHA256
71630a7e073da90c78b76ed5368886e1b3c38e45a67b0750dc833e4ea427ec6a
-
SHA512
584a0e9b8db20159c975969f12fd448ff6b4802993298e22de8ac9d70f1eeb076f31a1c97ba067367e680a96dba3ef73fb1c5fb9cfe8a767f6750f85980b02de
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210702-080246.exe
Resource
win7v20210410
Malware Config
Extracted
raccoon
7ea5512058d479def2eeb58bd2231423ad2fdf37
-
url4cnc
https://telete.in/h_electricryptors2
Targets
-
-
Target
usfive_20210702-080246
-
Size
517KB
-
MD5
4f8ae6eaf2af7b6063eaad06daeec647
-
SHA1
7ab1a53066ad2ac7d472ad4300f6fc7367e89fb1
-
SHA256
71630a7e073da90c78b76ed5368886e1b3c38e45a67b0750dc833e4ea427ec6a
-
SHA512
584a0e9b8db20159c975969f12fd448ff6b4802993298e22de8ac9d70f1eeb076f31a1c97ba067367e680a96dba3ef73fb1c5fb9cfe8a767f6750f85980b02de
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
DarkVNC Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-