General
-
Target
usfive_20210808-230024
-
Size
512KB
-
Sample
210808-g5sgjalqzs
-
MD5
3017ca4cc62880230dc67a092109323b
-
SHA1
577ae7d931d653b3a159b477b0311f2a6e32ccb8
-
SHA256
15e07520b35264846e6bedf304a486272112afcba09717f942d7e6d52199bd95
-
SHA512
35f7e1655a10f99cf58e0ff7193ec2829d07023e0235d1e20af4b8b2511e41b4b16f7ff289bb9e9c798de856f6391fa3cc3164119d71ab886d8080eab7826937
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210808-230024.exe
Resource
win7v20210410
Malware Config
Extracted
raccoon
c58b0b3f1f90ad7552aaf8e84180b7580f397001
-
url4cnc
https://telete.in/h_electricryptors2
Targets
-
-
Target
usfive_20210808-230024
-
Size
512KB
-
MD5
3017ca4cc62880230dc67a092109323b
-
SHA1
577ae7d931d653b3a159b477b0311f2a6e32ccb8
-
SHA256
15e07520b35264846e6bedf304a486272112afcba09717f942d7e6d52199bd95
-
SHA512
35f7e1655a10f99cf58e0ff7193ec2829d07023e0235d1e20af4b8b2511e41b4b16f7ff289bb9e9c798de856f6391fa3cc3164119d71ab886d8080eab7826937
-
Raccoon Stealer Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
DarkVNC Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-