General
-
Target
malware.7z
-
Size
688KB
-
Sample
250323-zbkj3svsc1
-
MD5
8f96070ece15d2ac7bd98e89e8f9119b
-
SHA1
7fa4661d75a2c40d1abe540dcc58f9fe0bba9962
-
SHA256
fc692e62d466b316c3d0174fdbe6fa6d778e47e29b356a39d9a8f3df1e4a571d
-
SHA512
14917b01f4083d676cdd7afde76c136c2a4fbed8d1bfad3be850b53dbb2bb3168ab26a9a8c288e203806e89efacae2f943da279636f75c11c9fb9faf22534a01
-
SSDEEP
12288:8iOQ2snGfsgFZvXGHlaMUM5X/uOIPGzDbWoKtEnImpOPySv6eeRPPHsrmI8qzLPT:3DG0gFZfGHltDPujPqu2Pp8yVRPPAjvT
Behavioral task
behavioral1
Sample
0.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
3.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
3.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
vidar
28.3
651
http://manillamemories.com/
-
profile_id
651
Extracted
raccoon
4ea2de23519e3f57fa6e68e00db8cdfa44e74741
-
url4cnc
https://telete.in/char0nsevenll
Targets
-
-
Target
0
-
Size
449KB
-
MD5
7b20f5c61780fe383f45ca6e18ed5a6a
-
SHA1
bc9bfd59f0cde312cd9a0d20784887fed9b8c836
-
SHA256
26ccbcb079b3f0cc183293351c40da3146d2ddec9b4d6cd314090cfab94834df
-
SHA512
8a63f6ad20fe18bd49d055ae05bc81fe30d0ebfb25a37428b17b43569b53bf2560f0de8f993f62a2f5d458db78e6d24ad71fca8d7fd1133d3cb499dff356e68b
-
SSDEEP
12288:r7fSQUrrX/pC2Hwxx/Pb1JTUPd0o7Vzl:rzynxmPrrTUPdL7VJ
-
Raccoon Stealer V1 payload
-
Raccoon family
-
-
-
Target
1
-
Size
544KB
-
MD5
b8181cb72764c24e73c7b6204b16bed6
-
SHA1
c430cc4776ff5e21d08bca9a0d73cfaf29108fa4
-
SHA256
fdb5a0d4e97ee36d2b23605b0d8a2785d08d046058f07a8714e4908e8a2485a2
-
SHA512
bd63970b846bfdc6990b803e12028c692bc3f3125df03c3b9ec4626e1ce56dc43313d37c71337868ade0e4da31a5eca971b453242829b7312eb7efd2a407de1d
-
SSDEEP
12288:WPWVd0taaWew/8s63jxtNAcbYl7rvO6FFo/JVWOPx3/y:cGWcQwcTxth0lHvHoxVWOP
-
Vidar family
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
3
-
Size
97KB
-
MD5
499ccc8d6d7c08e135a91928ccc2fd7a
-
SHA1
78b2b70ad8e49cd2e8518501a29d1af1e714a16f
-
SHA256
1fa5d83a5766556cf2ff16ad279e73cb40584746bd388e0a4e818a2cc06613d3
-
SHA512
0f891ce5fb557a9a03644d83df15f0326f4caef42c00e484b8e88182b6414f419ecf010e66db308b9ea48dbb4544f3cb16338e5d813e98051415dffb7ea7a4c2
-
SSDEEP
1536:zO/z6hPABUjO/Zd1716EoLiL4l1HdIaqQPDm0xK8i6f0Zn9PRVW8sW45o7:kzgjO/Zd1RePDmZ8tf05iW4u
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-