General
-
Target
f04b77c60c896b33ed8fe286de3341fc3ffd0211a987435475dc7e9d0abcb0cc
-
Size
346KB
-
Sample
220113-19tfbacha2
-
MD5
df7952a5fc82dfb2e49ae81b6a1be135
-
SHA1
4f3a8cd939fbe37426efda7c88fbd2e49d8f8986
-
SHA256
f04b77c60c896b33ed8fe286de3341fc3ffd0211a987435475dc7e9d0abcb0cc
-
SHA512
96a495e5d30e66a236c0aea19daedf95b31f254e457647b6553f2d6cae117f0a6da2468550333fbae3ffa94d0960e2459d2259d3b4c2598efe49fc03e6c36f1a
Static task
static1
Malware Config
Extracted
raccoon
1.8.4-hotfixs
Targets
-
-
Target
f04b77c60c896b33ed8fe286de3341fc3ffd0211a987435475dc7e9d0abcb0cc
-
Size
346KB
-
MD5
df7952a5fc82dfb2e49ae81b6a1be135
-
SHA1
4f3a8cd939fbe37426efda7c88fbd2e49d8f8986
-
SHA256
f04b77c60c896b33ed8fe286de3341fc3ffd0211a987435475dc7e9d0abcb0cc
-
SHA512
96a495e5d30e66a236c0aea19daedf95b31f254e457647b6553f2d6cae117f0a6da2468550333fbae3ffa94d0960e2459d2259d3b4c2598efe49fc03e6c36f1a
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
LoaderBot executable
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-