General
-
Target
Raven Tools.rar
-
Size
71KB
-
Sample
230702-t2rhesca65
-
MD5
915a2f4033bc591e17e189c114250319
-
SHA1
c23019cb04a5511b4a115ad505f2322913937f0b
-
SHA256
efb842c17bea010e0b056d48d076e66c3ef742f4c7c546d12d36dc80b88bf149
-
SHA512
206a067c890bfe1aae1f9cb6c1f341031edb5b9441c5630f75ffef40645a3289780c7f75821f6a25c3d6f0af91febae29090cafe36bc99ffa50e14b45e7d65e5
-
SSDEEP
1536:iCnHag5SdayRxuI0aVTmIylGL1B6Q+YDaDQNoYlJwK0Z8:iCXsv3u0KKBOJ0u8
Malware Config
Extracted
xworm
127.0.0.1:7000
-
install_file
USB.exe
Targets
-
-
Target
Raven Tools/Raven Tools.exe
-
Size
105KB
-
MD5
2823fd1cfb783a1905eac437b0bb0bd0
-
SHA1
81aa39cbb201c5ef8febaf9943501575a170abfe
-
SHA256
b2b3089fbc8c17871abb47f248b487459f73c1944278da81bd64ca89fc5c24e1
-
SHA512
88c2b2a6e9edf76922b45e645cb9486debf698df4034c17e8891fac2754d486f7c479b702d8a4e0947c55ba71ffd9406f4fb0edb5f1cf455ea2fa287b01f032f
-
SSDEEP
1536:chIzRsPbIk/RV/ovahCX4Aps8bljMJIf6ShOIEpOZetiRpc5+i+qVQY:cSk/k9oAnbljMC6tpOZe0pinr2Y
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-