General
-
Target
usfive_20210702-092142
-
Size
517KB
-
Sample
210702-wbdf4rjwx2
-
MD5
80562c5cd57912c40f8b0be908342f66
-
SHA1
9c0badf5034c7fcdf70cac8485bee48e36eb7494
-
SHA256
97be6c2e359f6afcd996f6eb2d7e49b119f1f55bbe9274b00f23d9013c26895a
-
SHA512
d0e42ed8f189166fb0740cf48cf04e25defa823d5e2a26c4fc9b235e5ee7c5dbfc7319a5b99e97c6b6e2132f22831f4d87fa8a2828296456f1c0dd59a876615a
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210702-092142.exe
Resource
win7v20210410
Malware Config
Extracted
raccoon
7ea5512058d479def2eeb58bd2231423ad2fdf37
-
url4cnc
https://telete.in/h_electricryptors2
Targets
-
-
Target
usfive_20210702-092142
-
Size
517KB
-
MD5
80562c5cd57912c40f8b0be908342f66
-
SHA1
9c0badf5034c7fcdf70cac8485bee48e36eb7494
-
SHA256
97be6c2e359f6afcd996f6eb2d7e49b119f1f55bbe9274b00f23d9013c26895a
-
SHA512
d0e42ed8f189166fb0740cf48cf04e25defa823d5e2a26c4fc9b235e5ee7c5dbfc7319a5b99e97c6b6e2132f22831f4d87fa8a2828296456f1c0dd59a876615a
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
DarkVNC Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-