General
-
Target
usfive_20210702-121519
-
Size
478KB
-
Sample
210702-neg3b4r8kj
-
MD5
9dbeff2c2580c6572f80c4e2b04678a7
-
SHA1
34d1850d42bcf79426ccdf8fb97109b4ac2bac08
-
SHA256
594c75742171141dfe13c8e13fc23e54dd0c8267376a756063b46115cb0abc4c
-
SHA512
b406c72f1297810f9fa0a1448b68cb708996765abf35bd646e369ab3f291e5181d34d7f8bf4740caa7564d426de039bb874fd50bacfdff168ae27516b26fac0f
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210702-121519.exe
Resource
win7v20210410
Malware Config
Extracted
raccoon
7ea5512058d479def2eeb58bd2231423ad2fdf37
-
url4cnc
https://telete.in/h_electricryptors2
Targets
-
-
Target
usfive_20210702-121519
-
Size
478KB
-
MD5
9dbeff2c2580c6572f80c4e2b04678a7
-
SHA1
34d1850d42bcf79426ccdf8fb97109b4ac2bac08
-
SHA256
594c75742171141dfe13c8e13fc23e54dd0c8267376a756063b46115cb0abc4c
-
SHA512
b406c72f1297810f9fa0a1448b68cb708996765abf35bd646e369ab3f291e5181d34d7f8bf4740caa7564d426de039bb874fd50bacfdff168ae27516b26fac0f
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
DarkVNC Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-