General
-
Target
crack file.exe
-
Size
1.7MB
-
Sample
230322-srwtqahe84
-
MD5
3be7815f097914ca1bce77bbfab48ba4
-
SHA1
9822603ebcc7bc1b0b109131e292db562cc0c55b
-
SHA256
a8ce713a2d85e1c00b2a3075334ee1a6879cb34abdf70431e2184d5bcc83940e
-
SHA512
4f0d1caf21366fa19c9862dc1892f2dba36c547f7b8d8086f5552834772a25b515597befd259f9e5b61b09118e73b4c81ed3accfef09f56b6233513e1c98bfd4
-
SSDEEP
49152:NJ4HLNsPv/IIv0ZDgYdIvDD/CT40j0KzPLxN9tn:NJ4Hxs78Pi/r20KbLnn
Static task
static1
Behavioral task
behavioral1
Sample
crack file.exe
Resource
win7-20230220-en
Malware Config
Extracted
https://neutropharma.com/wp/wp-content/debug2.ps1
Extracted
raccoon
cf8e11f4b26a8b6523ebca1d025854f5
http://109.234.39.45/
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Targets
-
-
Target
crack file.exe
-
Size
1.7MB
-
MD5
3be7815f097914ca1bce77bbfab48ba4
-
SHA1
9822603ebcc7bc1b0b109131e292db562cc0c55b
-
SHA256
a8ce713a2d85e1c00b2a3075334ee1a6879cb34abdf70431e2184d5bcc83940e
-
SHA512
4f0d1caf21366fa19c9862dc1892f2dba36c547f7b8d8086f5552834772a25b515597befd259f9e5b61b09118e73b4c81ed3accfef09f56b6233513e1c98bfd4
-
SSDEEP
49152:NJ4HLNsPv/IIv0ZDgYdIvDD/CT40j0KzPLxN9tn:NJ4Hxs78Pi/r20KbLnn
-
Detects PseudoManuscrypt payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
PseudoManuscrypt
PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Uses the VBS compiler for execution
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-