General
-
Target
nеwрhоtоshор.zip
-
Size
7.4MB
-
Sample
230302-n5rdyacg66
-
MD5
80c3969f709804728399d605da6d8e31
-
SHA1
5820fc1e989176141dff98d5d66b941ddd2cd76a
-
SHA256
f873781a793346eb06f9682631872f29911c1b0e7154ed7cc736828218edac68
-
SHA512
303cf052a8abc79aa6e339c52e4de048e79a5dc75eafabfbc51ed1cf8444e8825fb1bc68701097c4258537793803eebf3afca206869a727c6e4c294a8015c744
-
SSDEEP
196608:/ZjZlcG0K/sb0V4eiEcce66uYJrOS2qBb4X++fEh1Z:/ZlqG0wyKriH5JSChlr
Static task
static1
Behavioral task
behavioral1
Sample
nеwрhоtоshор.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
nеwрhоtоshор.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
raccoon
8fb7b851641d456f39570978e99f780e
http://45.15.156.239/
Targets
-
-
Target
nеwрhоtоshор.exe
-
Size
727.0MB
-
MD5
f60b37f7828656a7a146ab4af83b9859
-
SHA1
17e27e3e18fa195829a67d3fbc46c8ea9aebc817
-
SHA256
14cf407d1989d77a558c7fc4fb62c981ee4c13a73f6c5e20c6194f3e6d1053dd
-
SHA512
06ddfe93f23ccb6e3acbe99cc743ba660245a7fb87887c78a1eb4f124964e8db70be3d8d8ee9dd8e2c57dcef52846c06dc62bb5641369440b8576c6960722ada
-
SSDEEP
196608:DkBkoGNu/6bIN6aEIqGCG2EuhdheNKAcqvWt:oGoOuESxEFzhdOKFqvWt
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-