General
-
Target
ac.exe
-
Size
396KB
-
Sample
240227-b1mtqsdg2v
-
MD5
5cddc68460463a32782f94c595dea500
-
SHA1
786ad838dfbea097f192727d90bc899073ae3260
-
SHA256
023fb24e4591fcbbff6096a61e7cbfb79bc1bade9236dd0db6ede7ab1e00bf9f
-
SHA512
e8828d612037a5baf32fa6576cacea2b3c02c5618d7f750e86d4d73aec81a0d93989f754c8f2fa63bb2275f12ff4d740ef4c26db3882ada4f2ab1e5964700715
-
SSDEEP
12288:PFCMQSKRhznUR1GUKY0WXbt7M5K/FbTx:NCYKRhbBUaKbtY5K/f
Static task
static1
Behavioral task
behavioral1
Sample
ac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
raccoon
ee3b370277b98939f8098234def6cb188c03591f
-
url4cnc
https://telete.in/brikitiki
Targets
-
-
Target
ac.exe
-
Size
396KB
-
MD5
5cddc68460463a32782f94c595dea500
-
SHA1
786ad838dfbea097f192727d90bc899073ae3260
-
SHA256
023fb24e4591fcbbff6096a61e7cbfb79bc1bade9236dd0db6ede7ab1e00bf9f
-
SHA512
e8828d612037a5baf32fa6576cacea2b3c02c5618d7f750e86d4d73aec81a0d93989f754c8f2fa63bb2275f12ff4d740ef4c26db3882ada4f2ab1e5964700715
-
SSDEEP
12288:PFCMQSKRhznUR1GUKY0WXbt7M5K/FbTx:NCYKRhbBUaKbtY5K/f
-
Detect ZGRat V1
-
Raccoon Stealer V1 payload
-
Suspicious use of SetThreadContext
-