General
-
Target
usfive_20210703-005320
-
Size
477KB
-
Sample
210702-mjs8srn226
-
MD5
37e6c118cd5e5f93527194bb4e0070fb
-
SHA1
9f666cafb9cf62472568bc74a3791e68d1a45433
-
SHA256
3fcca6f3efb07b6177bb87174ded29ad41a14571c61529fd519572cad70006d4
-
SHA512
8906586af727fa713d61b461aee49e97a2438ac7af691178f901e6be62f946ad482c9c4b2528c9b8dffd066d52d5bee284d48e52f6122e07d91dfd24f95941ec
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210703-005320.exe
Resource
win7v20210410
Malware Config
Extracted
raccoon
7ea5512058d479def2eeb58bd2231423ad2fdf37
-
url4cnc
https://telete.in/h_electricryptors2
Targets
-
-
Target
usfive_20210703-005320
-
Size
477KB
-
MD5
37e6c118cd5e5f93527194bb4e0070fb
-
SHA1
9f666cafb9cf62472568bc74a3791e68d1a45433
-
SHA256
3fcca6f3efb07b6177bb87174ded29ad41a14571c61529fd519572cad70006d4
-
SHA512
8906586af727fa713d61b461aee49e97a2438ac7af691178f901e6be62f946ad482c9c4b2528c9b8dffd066d52d5bee284d48e52f6122e07d91dfd24f95941ec
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
DarkVNC Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-