General
-
Target
usfive_20210808-184641
-
Size
512KB
-
Sample
210808-dgbnqr73jn
-
MD5
f61ebb45ff423851fc48133bbcf49a83
-
SHA1
71ac9fe46382fff620ffccb01d13c91233519f31
-
SHA256
7e3b21ad9998cf8cb40f6471307c42d81f7ade43d52db956205cb251e3ba2579
-
SHA512
07444eb698d93411cf289a5154b9989f3960bedbaf114d4325fb7217222ce9634691d5b4f9549ca4d77a5ecaf1e91ff152278b7cc5236476bd3680de1e7b64e6
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210808-184641.exe
Resource
win7v20210410
Malware Config
Extracted
raccoon
c58b0b3f1f90ad7552aaf8e84180b7580f397001
-
url4cnc
https://telete.in/h_electricryptors2
Targets
-
-
Target
usfive_20210808-184641
-
Size
512KB
-
MD5
f61ebb45ff423851fc48133bbcf49a83
-
SHA1
71ac9fe46382fff620ffccb01d13c91233519f31
-
SHA256
7e3b21ad9998cf8cb40f6471307c42d81f7ade43d52db956205cb251e3ba2579
-
SHA512
07444eb698d93411cf289a5154b9989f3960bedbaf114d4325fb7217222ce9634691d5b4f9549ca4d77a5ecaf1e91ff152278b7cc5236476bd3680de1e7b64e6
-
Raccoon Stealer Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
DarkVNC Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-