General
-
Target
fe182a93d10cf8b048cb1a72b07f80ded9f6e2e0177f74f2baf9f17ede242ee9
-
Size
199KB
-
Sample
210926-q5t6yaeghn
-
MD5
231bd999a5103521852e4c3e283bb649
-
SHA1
27fd4940930c42ea737669760640400748b1124c
-
SHA256
fe182a93d10cf8b048cb1a72b07f80ded9f6e2e0177f74f2baf9f17ede242ee9
-
SHA512
d2df51691783e348f72b1f7ef660225d89f8c0f07561102b5f3bace3261e68be28a5c5a4d8a9b5ef73c92039d8857cfd82fb846757c2e68779590ba6d02863cd
Static task
static1
Malware Config
Extracted
smokeloader
2020
http://naghenrietti1.top/
http://kimballiett2.top/
http://xadriettany3.top/
http://jebeccallis4.top/
http://nityanneron5.top/
http://umayaniela6.top/
http://lynettaram7.top/
http://sadineyalas8.top/
http://geenaldencia9.top/
http://aradysiusep10.top/
Extracted
raccoon
5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4
-
url4cnc
https://t.me/agrybirdsgamerept
Targets
-
-
Target
fe182a93d10cf8b048cb1a72b07f80ded9f6e2e0177f74f2baf9f17ede242ee9
-
Size
199KB
-
MD5
231bd999a5103521852e4c3e283bb649
-
SHA1
27fd4940930c42ea737669760640400748b1124c
-
SHA256
fe182a93d10cf8b048cb1a72b07f80ded9f6e2e0177f74f2baf9f17ede242ee9
-
SHA512
d2df51691783e348f72b1f7ef660225d89f8c0f07561102b5f3bace3261e68be28a5c5a4d8a9b5ef73c92039d8857cfd82fb846757c2e68779590ba6d02863cd
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Arkei Stealer Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-