General
-
Target
usfive_20210809-095748
-
Size
511KB
-
Sample
210809-35bb7j7tne
-
MD5
4be0cbe1709ca5653bcc77a22511dd46
-
SHA1
c4492e5cfe705f705fb08bcb3dfe0b30af408d36
-
SHA256
244d3624209d79d74194422cb15ca209f957088aa1ee87a7cffadd0d6d3dfbc1
-
SHA512
b769a084d811065e8f14fced9b8f67d7b1b8b1d557381256f9321da694724cbe3bab9621899a8987ae2429f3a919f1f47c1336d031340d77056387ef0218a790
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210809-095748.exe
Resource
win7v20210408
Malware Config
Extracted
raccoon
c58b0b3f1f90ad7552aaf8e84180b7580f397001
-
url4cnc
https://telete.in/h_electricryptors2
Targets
-
-
Target
usfive_20210809-095748
-
Size
511KB
-
MD5
4be0cbe1709ca5653bcc77a22511dd46
-
SHA1
c4492e5cfe705f705fb08bcb3dfe0b30af408d36
-
SHA256
244d3624209d79d74194422cb15ca209f957088aa1ee87a7cffadd0d6d3dfbc1
-
SHA512
b769a084d811065e8f14fced9b8f67d7b1b8b1d557381256f9321da694724cbe3bab9621899a8987ae2429f3a919f1f47c1336d031340d77056387ef0218a790
-
Raccoon Stealer Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
DarkVNC Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-