General
-
Target
9fbb8a90e9b971800f4bdb85e1bf8f7c
-
Size
1.0MB
-
Sample
231219-zzad1sccer
-
MD5
9fbb8a90e9b971800f4bdb85e1bf8f7c
-
SHA1
cf116f3df69bbb896f34f24d26c4573b14af2fe5
-
SHA256
b6afb4c2d094c9e803015e65043ee6a48bbf0e31bdd66963078ca1454195b1c6
-
SHA512
437907045e9a5af27db8a60db05780e72e60b58cc4949723d3f4b2b0d372aee13ed18335dec3ba33e32ae583046a9ef200eaf40df991746adf480bfda07be9f7
-
SSDEEP
24576:IlE2q8MnAWRpnwU9QtTJaur6Syt4VhkFha1OIgImZk3xk5npFhkF96x5hkFYelP:2EeKTqtN7r7VV0VIm0yRpF0I0N
Static task
static1
Behavioral task
behavioral1
Sample
9fbb8a90e9b971800f4bdb85e1bf8f7c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9fbb8a90e9b971800f4bdb85e1bf8f7c.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
oski
milsom.ug
Extracted
azorult
http://195.245.112.115/index.php
Extracted
raccoon
1.8.1
e16d9c3413a8d3bc552d87560e5a14148908608d
-
url4cnc
https://t.me/brikitiki
Targets
-
-
Target
9fbb8a90e9b971800f4bdb85e1bf8f7c
-
Size
1.0MB
-
MD5
9fbb8a90e9b971800f4bdb85e1bf8f7c
-
SHA1
cf116f3df69bbb896f34f24d26c4573b14af2fe5
-
SHA256
b6afb4c2d094c9e803015e65043ee6a48bbf0e31bdd66963078ca1454195b1c6
-
SHA512
437907045e9a5af27db8a60db05780e72e60b58cc4949723d3f4b2b0d372aee13ed18335dec3ba33e32ae583046a9ef200eaf40df991746adf480bfda07be9f7
-
SSDEEP
24576:IlE2q8MnAWRpnwU9QtTJaur6Syt4VhkFha1OIgImZk3xk5npFhkF96x5hkFYelP:2EeKTqtN7r7VV0VIm0yRpF0I0N
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Raccoon Stealer V1 payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-