General
-
Target
usfive_20210702-140549
-
Size
478KB
-
Sample
210702-hzfnw5vl12
-
MD5
235dfb514cc7c9d0115e881531b22fe0
-
SHA1
963119b6160695cc30d5f827e12e9c843b666f2f
-
SHA256
3803b0d480e36400557365f3f32e264b80d89acded0921d0d28e1f11ea1710a1
-
SHA512
89d50c7d5f540ceadd41d5f68500bedaae029cbd92a6f4161dcc84fabda74cc5799dee27a0c98e9254bd662f0a8abef818af8988eb381f2acfa52faa5c72374b
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210702-140549.exe
Resource
win7v20210410
Malware Config
Extracted
raccoon
7ea5512058d479def2eeb58bd2231423ad2fdf37
-
url4cnc
https://telete.in/h_electricryptors2
Targets
-
-
Target
usfive_20210702-140549
-
Size
478KB
-
MD5
235dfb514cc7c9d0115e881531b22fe0
-
SHA1
963119b6160695cc30d5f827e12e9c843b666f2f
-
SHA256
3803b0d480e36400557365f3f32e264b80d89acded0921d0d28e1f11ea1710a1
-
SHA512
89d50c7d5f540ceadd41d5f68500bedaae029cbd92a6f4161dcc84fabda74cc5799dee27a0c98e9254bd662f0a8abef818af8988eb381f2acfa52faa5c72374b
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
DarkVNC Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-