General
-
Target
usfive_20210702-165932
-
Size
478KB
-
Sample
210702-zjbr6ajzx2
-
MD5
42c77ad9bf6acbffc18d86dd7a0dc598
-
SHA1
15b2ce0aa433523fa6da295fc7d01b945ce79703
-
SHA256
a6c1e18ead324e1db2765851792d40244d64706c6d712331a78cfe14a9e56088
-
SHA512
ddb2369ad1091f837e2914642b3a353e36ac23939097659ed3e3475eb0596058cb8116af466fde12a8e5da8f9784785697ee19ded1315f9ee13aeab4e77092ce
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210702-165932.exe
Resource
win7v20210408
Malware Config
Extracted
raccoon
7ea5512058d479def2eeb58bd2231423ad2fdf37
-
url4cnc
https://telete.in/h_electricryptors2
Targets
-
-
Target
usfive_20210702-165932
-
Size
478KB
-
MD5
42c77ad9bf6acbffc18d86dd7a0dc598
-
SHA1
15b2ce0aa433523fa6da295fc7d01b945ce79703
-
SHA256
a6c1e18ead324e1db2765851792d40244d64706c6d712331a78cfe14a9e56088
-
SHA512
ddb2369ad1091f837e2914642b3a353e36ac23939097659ed3e3475eb0596058cb8116af466fde12a8e5da8f9784785697ee19ded1315f9ee13aeab4e77092ce
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
DarkVNC Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-