General
-
Target
84d840893dc669a95c97d0686f37b13fc365ee314267038923210b9c82c1c65c
-
Size
1.4MB
-
Sample
210930-xb3pjsadhj
-
MD5
64e809a0d16a027067c7dd7684293c37
-
SHA1
126cf22cb6084f67eb8887b93c9cf13fe5b682d2
-
SHA256
84d840893dc669a95c97d0686f37b13fc365ee314267038923210b9c82c1c65c
-
SHA512
d6a5c0dfc4caa3f700a2da4177e28dfcf1f6d93381e0aa924388c65042e89a86afe503d599ed45ea439fda4a75d7e717f83bf6a1bf6206a7637e6aa9d0a0d81a
Static task
static1
Behavioral task
behavioral1
Sample
84d840893dc669a95c97d0686f37b13fc365ee314267038923210b9c82c1c65c.exe
Resource
win10v20210408
Malware Config
Extracted
raccoon
6b473ae90575e46165b57807704d00b90b7f6fb2
-
url4cnc
http://teletop.top/viv0ramadium0,http://teleta.top/viv0ramadium0,https://t.me/viv0ramadium0
Targets
-
-
Target
84d840893dc669a95c97d0686f37b13fc365ee314267038923210b9c82c1c65c
-
Size
1.4MB
-
MD5
64e809a0d16a027067c7dd7684293c37
-
SHA1
126cf22cb6084f67eb8887b93c9cf13fe5b682d2
-
SHA256
84d840893dc669a95c97d0686f37b13fc365ee314267038923210b9c82c1c65c
-
SHA512
d6a5c0dfc4caa3f700a2da4177e28dfcf1f6d93381e0aa924388c65042e89a86afe503d599ed45ea439fda4a75d7e717f83bf6a1bf6206a7637e6aa9d0a0d81a
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-