General
-
Target
63aa46c2f83941e8517b7fbd05e15f2c2460c0ddeb9cd903a0c58ff2dca380e2.exe
-
Size
687KB
-
Sample
200319-k9qzl187ea
-
MD5
d4dad82dd4ed06b230151a6496884ff6
-
SHA1
d4d3017a9188c0087bf65e644a200a9aefbbce1b
-
SHA256
63aa46c2f83941e8517b7fbd05e15f2c2460c0ddeb9cd903a0c58ff2dca380e2
-
SHA512
d95ca593907b3552a47f3070def99b2bba6ed1939b8fa598b5e023ee931e4a3fe8c333e3ccf88a00350330abdc6da87eded16f55d19115242b56d14f47be0bf2
Static task
static1
Behavioral task
behavioral1
Sample
63aa46c2f83941e8517b7fbd05e15f2c2460c0ddeb9cd903a0c58ff2dca380e2.exe
Resource
win7v200217
Behavioral task
behavioral2
Sample
63aa46c2f83941e8517b7fbd05e15f2c2460c0ddeb9cd903a0c58ff2dca380e2.exe
Resource
win10v200217
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
raccoon
63b0da3331d966cfbcc1dbb16cf24eac9a5d4e85
http://34.76.15.247/gate/log.php
-
url4cnc
https://drive.google.com/uc?export=download&id=1I7jmFhJY4KCn0dqAcr5L-h-D70KGZkaF
Targets
-
-
Target
63aa46c2f83941e8517b7fbd05e15f2c2460c0ddeb9cd903a0c58ff2dca380e2.exe
-
Size
687KB
-
MD5
d4dad82dd4ed06b230151a6496884ff6
-
SHA1
d4d3017a9188c0087bf65e644a200a9aefbbce1b
-
SHA256
63aa46c2f83941e8517b7fbd05e15f2c2460c0ddeb9cd903a0c58ff2dca380e2
-
SHA512
d95ca593907b3552a47f3070def99b2bba6ed1939b8fa598b5e023ee931e4a3fe8c333e3ccf88a00350330abdc6da87eded16f55d19115242b56d14f47be0bf2
-
Executes dropped EXE
-
Loads dropped DLL
-
Program crash
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-
Legitimate hosting services abused for malware hosting/C2.
-
Suspicious use of SetThreadContext
-