General
-
Target
svctask.exe
-
Size
179KB
-
Sample
220913-tp3pxsgac8
-
MD5
37f5d247d6003592fa8092d5defa4756
-
SHA1
83ccbe599c2c25e563a9cbca883ed0576cb77030
-
SHA256
34266fc97d6067f4f7348232a79612f907d5eb7ddd01bf5bbdab95e0631c6a23
-
SHA512
f09d14d56718a08bd8eb93ec8aeafab4ca0a40cee3e52e766ebe8c87dd248a30f24b61ce49242e9b2306c80e5bbeb784bf61f8fad4051b6afef847a302d8b235
-
SSDEEP
3072:ZM84rK+NLSAd7FPJCQ7Y6f/r9IZmZCkWAxCKU1SRwkBjSd5:KPuuLSE7FeZxkBSA6d
Static task
static1
Behavioral task
behavioral1
Sample
svctask.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
raccoon
4fe4637a73d298373737df144bcdd275
http://144.76.31.117/
Targets
-
-
Target
svctask.exe
-
Size
179KB
-
MD5
37f5d247d6003592fa8092d5defa4756
-
SHA1
83ccbe599c2c25e563a9cbca883ed0576cb77030
-
SHA256
34266fc97d6067f4f7348232a79612f907d5eb7ddd01bf5bbdab95e0631c6a23
-
SHA512
f09d14d56718a08bd8eb93ec8aeafab4ca0a40cee3e52e766ebe8c87dd248a30f24b61ce49242e9b2306c80e5bbeb784bf61f8fad4051b6afef847a302d8b235
-
SSDEEP
3072:ZM84rK+NLSAd7FPJCQ7Y6f/r9IZmZCkWAxCKU1SRwkBjSd5:KPuuLSE7FeZxkBSA6d
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-