General
-
Target
0d0bfea25b921d11907d61def9e94c6e
-
Size
1.0MB
-
Sample
231219-mxdmfafgbr
-
MD5
0d0bfea25b921d11907d61def9e94c6e
-
SHA1
b97bb93555740b6fd473983e35585a7c1ad3d427
-
SHA256
b9acbe3e107eb4dd11e9fcaef4ec4f394cf1cbb017a57193786ba03c6f8fd0db
-
SHA512
b638d5cfa99e904ac200ada18e7cb9278ed94f35968fd458824eb4007ff18a954f70552c0177483f524157fe68393673f681f9908b76dfc1f98456e0cfecb68f
-
SSDEEP
24576:IlE2q8MnAWRpnwU9QtTJaur6Syt4VhkFha1OIgImZk3xk5npFhkF96x5hkFYelf:2EeKTqtN7r7VV0VIm0yRpF0I0d
Static task
static1
Behavioral task
behavioral1
Sample
0d0bfea25b921d11907d61def9e94c6e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d0bfea25b921d11907d61def9e94c6e.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
raccoon
1.8.1
e16d9c3413a8d3bc552d87560e5a14148908608d
-
url4cnc
https://t.me/brikitiki
Extracted
oski
milsom.ug
Extracted
azorult
http://195.245.112.115/index.php
Targets
-
-
Target
0d0bfea25b921d11907d61def9e94c6e
-
Size
1.0MB
-
MD5
0d0bfea25b921d11907d61def9e94c6e
-
SHA1
b97bb93555740b6fd473983e35585a7c1ad3d427
-
SHA256
b9acbe3e107eb4dd11e9fcaef4ec4f394cf1cbb017a57193786ba03c6f8fd0db
-
SHA512
b638d5cfa99e904ac200ada18e7cb9278ed94f35968fd458824eb4007ff18a954f70552c0177483f524157fe68393673f681f9908b76dfc1f98456e0cfecb68f
-
SSDEEP
24576:IlE2q8MnAWRpnwU9QtTJaur6Syt4VhkFha1OIgImZk3xk5npFhkF96x5hkFYelf:2EeKTqtN7r7VV0VIm0yRpF0I0d
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Raccoon Stealer V1 payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-