General
-
Target
b8755a48782f629b3aa301d8d94b6a62ee7cb58ee149a418ff8a90b3df59c581
-
Size
512KB
-
Sample
211021-kk4lzsaae2
-
MD5
c46c6ef383839e686f3d3a0998c344ec
-
SHA1
097182d34d388744d5c307f7b0981dd8813ea52c
-
SHA256
b8755a48782f629b3aa301d8d94b6a62ee7cb58ee149a418ff8a90b3df59c581
-
SHA512
e67c9d5dc66477b1583f71b33ef49ba3217036a9925f28bf9c968966c3d2a6bbe240e11891e5e5cf7e461ddc649e9dae2e3750d8af03082687f5f367e13b634e
Static task
static1
Behavioral task
behavioral1
Sample
b8755a48782f629b3aa301d8d94b6a62ee7cb58ee149a418ff8a90b3df59c581.exe
Resource
win10-en-20210920
Malware Config
Extracted
raccoon
887a0ffaca448362277f2227182491216b734133
-
url4cnc
http://telegka.top/jdiamond13
http://telegin.top/jdiamond13
https://t.me/jdiamond13
Targets
-
-
Target
b8755a48782f629b3aa301d8d94b6a62ee7cb58ee149a418ff8a90b3df59c581
-
Size
512KB
-
MD5
c46c6ef383839e686f3d3a0998c344ec
-
SHA1
097182d34d388744d5c307f7b0981dd8813ea52c
-
SHA256
b8755a48782f629b3aa301d8d94b6a62ee7cb58ee149a418ff8a90b3df59c581
-
SHA512
e67c9d5dc66477b1583f71b33ef49ba3217036a9925f28bf9c968966c3d2a6bbe240e11891e5e5cf7e461ddc649e9dae2e3750d8af03082687f5f367e13b634e
-
Suspicious use of NtCreateProcessExOtherParentProcess
-