General
-
Target
Tutorial_1080pFHR.mp4
-
Size
7.5MB
-
Sample
230321-z7rm9sfb7y
-
MD5
095d552cbcd7b88ae751d8aeee300a43
-
SHA1
158ff63c89a1f25fa67d216242f11c7938eb22c1
-
SHA256
d03d2dbc94ae073b65a829872155db619ccfee90322799181d37ab671e66914a
-
SHA512
13f9834e88c83d966b3e5e5b395f17c9248c58ee35d59be1b5c45deedf0fded1f5d859c6435dc40773347f5c887c42dba2c4b0e4f35994ae566f4ecb89f45e28
-
SSDEEP
196608:vK0EChCax3d+0IMnibwl+DaRATR36emWKexXei:v5EChB/y6ib9uRABjP5n
Static task
static1
Behavioral task
behavioral1
Sample
Tutorial_1080pFHR.mp4
Resource
win10-20230220-en
Malware Config
Extracted
raccoon
f49765d62e02586d0fe162b5d3a934ad
http://78.153.130.123/
http://212.113.119.35/
http://212.113.119.48/
http://212.113.106.218/
Extracted
laplas
http://212.113.106.172
-
api_key
a8f23fb9332db9a7947580ee498822bfe375b57ad7eb47370c7209509050c298
Targets
-
-
Target
Tutorial_1080pFHR.mp4
-
Size
7.5MB
-
MD5
095d552cbcd7b88ae751d8aeee300a43
-
SHA1
158ff63c89a1f25fa67d216242f11c7938eb22c1
-
SHA256
d03d2dbc94ae073b65a829872155db619ccfee90322799181d37ab671e66914a
-
SHA512
13f9834e88c83d966b3e5e5b395f17c9248c58ee35d59be1b5c45deedf0fded1f5d859c6435dc40773347f5c887c42dba2c4b0e4f35994ae566f4ecb89f45e28
-
SSDEEP
196608:vK0EChCax3d+0IMnibwl+DaRATR36emWKexXei:v5EChB/y6ib9uRABjP5n
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-