General
-
Target
PC-File_Expert (1).rar
-
Size
51.9MB
-
Sample
230320-rcpanadg98
-
MD5
dd18d20d5092bfaa84b966af8dba24cf
-
SHA1
d2387f45af7151349a42c50af0b5217a7206688a
-
SHA256
3309937a7fe86f6a41ea9038628ca92d46bd5aebcafd9b18df0c6bbdd4f3917a
-
SHA512
b940c70f76a1ca710be06a6b1b8936c72078b990d861dee31d142a70541cfe19311edcb1630b0f8594a26bef6f5f7f0fcbbec5999e6a910de4d7824a51e8de73
-
SSDEEP
1572864:5JWZ2Z244Thb8TF0Xi+KBDTNn0W/SulTz/N:5UZXdhgp0FKBPRr/SulTz1
Static task
static1
Behavioral task
behavioral1
Sample
PC-File_Expert (1).rar
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
PC-File_Expert (1).rar
Resource
win10v2004-20230221-es
Malware Config
Extracted
raccoon
f49765d62e02586d0fe162b5d3a934ad
http://78.153.130.123/
http://212.113.119.35/
http://212.113.119.48/
http://212.113.106.218/
Extracted
laplas
http://212.113.106.172
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Targets
-
-
Target
PC-File_Expert (1).rar
-
Size
51.9MB
-
MD5
dd18d20d5092bfaa84b966af8dba24cf
-
SHA1
d2387f45af7151349a42c50af0b5217a7206688a
-
SHA256
3309937a7fe86f6a41ea9038628ca92d46bd5aebcafd9b18df0c6bbdd4f3917a
-
SHA512
b940c70f76a1ca710be06a6b1b8936c72078b990d861dee31d142a70541cfe19311edcb1630b0f8594a26bef6f5f7f0fcbbec5999e6a910de4d7824a51e8de73
-
SSDEEP
1572864:5JWZ2Z244Thb8TF0Xi+KBDTNn0W/SulTz/N:5UZXdhgp0FKBPRr/SulTz1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-