General
-
Target
a8bd61f636a4840af87c9733790271bcc120a43cd216da3f2e901bf5a9867417
-
Size
720KB
-
Sample
220524-svzpsabegn
-
MD5
46fe30d98adbf89c395574c7db5f798e
-
SHA1
91bb342409f7e90992945b80c48189a5a1c0a162
-
SHA256
a8bd61f636a4840af87c9733790271bcc120a43cd216da3f2e901bf5a9867417
-
SHA512
de61df6961728ffa138727ee2301083d2a4511fd96f0d425e3e9891d962af1923a6efd1fec153ec93388fadd7f547d8279436f6a935252760b419bfa4431e955
Static task
static1
Behavioral task
behavioral1
Sample
a8bd61f636a4840af87c9733790271bcc120a43cd216da3f2e901bf5a9867417.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a8bd61f636a4840af87c9733790271bcc120a43cd216da3f2e901bf5a9867417.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
raccoon
e5c7c06415dbd337f69c6c4ad51ec91ed9c82ab2
-
url4cnc
https://telete.in/bgangster1
Targets
-
-
Target
a8bd61f636a4840af87c9733790271bcc120a43cd216da3f2e901bf5a9867417
-
Size
720KB
-
MD5
46fe30d98adbf89c395574c7db5f798e
-
SHA1
91bb342409f7e90992945b80c48189a5a1c0a162
-
SHA256
a8bd61f636a4840af87c9733790271bcc120a43cd216da3f2e901bf5a9867417
-
SHA512
de61df6961728ffa138727ee2301083d2a4511fd96f0d425e3e9891d962af1923a6efd1fec153ec93388fadd7f547d8279436f6a935252760b419bfa4431e955
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
Raccoon Stealer Payload
-
CoreCCC Packer
Detects CoreCCC packer used to load .NET malware.
-
Suspicious use of SetThreadContext
-