General
-
Target
VTDown.zip
-
Size
12MB
-
Sample
230201-g89alacb78
-
MD5
1fe3ee0d5ce23cd513072e5485f8da95
-
SHA1
10ea989fe8d6d87826e36ac677b70dabec62c050
-
SHA256
21b7aaaf26ee918a87177864dab46f27a3f1262d048b7f09723cc9daabf1966f
-
SHA512
928d5cc2985562111eac09ec9435bbbe2170b2d1c26c1db1c4df4c5a144947db9173ac1a14386ed67f3a40a80b654086e2b3de9070747ce7ffdbb6ea7a4b824b
-
SSDEEP
196608:9rs87MYbQ2K6dkuTaTYNteSZKtN7JnJ47HnN3xntRnw91m/C7jBKKfT6I1Z0:7Yh2K6dkrTYXernJmt3JtCDJzy
Behavioral task
behavioral1
Sample
36ac3acd8c3eb0bb7d642d61ec4cc0e1a61eeae335c1c2d7e759d97233c60527.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
36ac3acd8c3eb0bb7d642d61ec4cc0e1a61eeae335c1c2d7e759d97233c60527.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
8079c95b3f0f302dc9adacdca42cc85d3961e3568406ef84ce61954df7208f9a.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
8079c95b3f0f302dc9adacdca42cc85d3961e3568406ef84ce61954df7208f9a.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
raccoon
8eb14caca01131f5f4ff62ef8a0fcab4
http://45.89.54.95/
http://45.89.54.25/
http://74.119.192.56/
http://146.19.170.153/
http://185.53.46.76/
http://5.182.39.34/
Targets
-
-
Target
36ac3acd8c3eb0bb7d642d61ec4cc0e1a61eeae335c1c2d7e759d97233c60527.bin
-
Size
394MB
-
MD5
3b1cbceeeeb2afe955e3d9eb8aebfe2d
-
SHA1
a184bb6d82236bd928707fe1a54f8aa30af025c7
-
SHA256
36ac3acd8c3eb0bb7d642d61ec4cc0e1a61eeae335c1c2d7e759d97233c60527
-
SHA512
4c0ae900b351e92c16aee7fa6480c1850a03d6911926ce60eda1df9e292b5f556782e7eb2fabfc6bb63ac7f88223eb7b7e38487efb65e70b376899c848b71b47
-
SSDEEP
49152:WNEe0GkOi1F6eQ+ydT+jLdhYiGS29SVPNpLnZRVhYXj/2YROvymC0DLG:WNEezKfdBhs+PnVhYyYROvyym
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648.bin
-
Size
395MB
-
MD5
6e304cd6d12c0d31869ed6e45fff4633
-
SHA1
a5bb3c851cbf05c88357074ea66e272f839d0537
-
SHA256
5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648
-
SHA512
8ba2a27800e5062ee96d1f3a6f1485584c6762276a2016d7f02c3f33201fd664c77f27d47ec3c8706eed6ba3661116c95aff1213d544f792f83640412b97a1f5
-
SSDEEP
196608:8YUmSslap7QMHe5HhVrHI/dl/v9TtZJD05y:ldEdCzrHSbv9troy
Score10/10 -
-
-
Target
8079c95b3f0f302dc9adacdca42cc85d3961e3568406ef84ce61954df7208f9a.bin
-
Size
2MB
-
MD5
2e6450058b2871bf5888d45d67a4758c
-
SHA1
550fd5fc040b4218ced382e945620bc42572b5ff
-
SHA256
8079c95b3f0f302dc9adacdca42cc85d3961e3568406ef84ce61954df7208f9a
-
SHA512
9333341e5bb13d0584688dd25d24c50bbf78059b6ade4fbc1b1701c1c2f484582188bf6e99a7879d8e93a95296cf277477b63330355fcc0923b2e65ebd23be31
-
SSDEEP
49152:SNlw9lnFTn7de6J503GljSdm1BG1KFwutMZMVVSkLZdP3Gl:S87Fr7oq26Ok1BwKF3nUkLZdP
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation