General
-
Target
7c0b8ecbbacfce4a4e12f9c8991375e74c7e5f0f3c2630ddf2b2be00800fd6ea
-
Size
274KB
-
Sample
220118-qhdknsbdfj
-
MD5
06ea164106eb8ff24d61a24c74f3f7d9
-
SHA1
3d039816c87cb75f5e7c6981ad1da6c36b345dba
-
SHA256
7c0b8ecbbacfce4a4e12f9c8991375e74c7e5f0f3c2630ddf2b2be00800fd6ea
-
SHA512
c510fd20d94fb533ec98abe881e59556626dcb9172c3a15944e87c6c8f75116c777c9030478e9ec1f63432f259b27d1a1c82b64e5ee899e3866f6941056ded0f
Static task
static1
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Extracted
raccoon
1.8.5
470193d69fd872b73819c5e70dc68242c10ccbce
-
url4cnc
http://185.163.204.22/capibar
http://178.62.113.205/capibar
https://t.me/capibar
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Extracted
raccoon
1.8.4-hotfixs
Targets
-
-
Target
7c0b8ecbbacfce4a4e12f9c8991375e74c7e5f0f3c2630ddf2b2be00800fd6ea
-
Size
274KB
-
MD5
06ea164106eb8ff24d61a24c74f3f7d9
-
SHA1
3d039816c87cb75f5e7c6981ad1da6c36b345dba
-
SHA256
7c0b8ecbbacfce4a4e12f9c8991375e74c7e5f0f3c2630ddf2b2be00800fd6ea
-
SHA512
c510fd20d94fb533ec98abe881e59556626dcb9172c3a15944e87c6c8f75116c777c9030478e9ec1f63432f259b27d1a1c82b64e5ee899e3866f6941056ded0f
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-