General
-
Target
64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe
-
Size
1.1MB
-
Sample
241127-rt82dstmbj
-
MD5
10b99eb3717353b52569a5a1e9234637
-
SHA1
5d46936d5cef95fdb572a50e866497b82fc023e9
-
SHA256
64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853
-
SHA512
27474a1031e212f4ec66e5a203602312f20625025d6559466d365f7f8b8c1f2eacdd6107fa6151a08c4e428bbd21beb9681f1aff89cab7540a08e66cdc01b8f8
-
SSDEEP
24576:w06qmrWqPh8mEa3H1WG+34OJ0CFpD0Yn+511xRZ8q2XoHWwb4:8rWI8jYH1m4OJ0gpD0Y+rYl
Static task
static1
Behavioral task
behavioral1
Sample
64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
raccoon
b76017a227a0d879dec7c76613918569d03892fb
-
url4cnc
http://telegka.top/brikitiki
http://telegin.top/brikitiki
https://t.me/brikitiki
Extracted
azorult
http://195.245.112.115/index.php
Extracted
oski
scarsa.ac.ug
Targets
-
-
Target
64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853.exe
-
Size
1.1MB
-
MD5
10b99eb3717353b52569a5a1e9234637
-
SHA1
5d46936d5cef95fdb572a50e866497b82fc023e9
-
SHA256
64031ca7bd657708a2fa8f313b6efe98e9f8a893db1d7fd025e09bdcb15a8853
-
SHA512
27474a1031e212f4ec66e5a203602312f20625025d6559466d365f7f8b8c1f2eacdd6107fa6151a08c4e428bbd21beb9681f1aff89cab7540a08e66cdc01b8f8
-
SSDEEP
24576:w06qmrWqPh8mEa3H1WG+34OJ0CFpD0Yn+511xRZ8q2XoHWwb4:8rWI8jYH1m4OJ0gpD0Y+rYl
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Oski family
-
Raccoon Stealer V1 payload
-
Raccoon family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-