General
-
Target
d40788efcdad214c3e3e280d956c1fb0af25dec1502e64f4a0cbe5e6c8676d83
-
Size
714KB
-
Sample
220228-1htxrsgfam
-
MD5
c9acb5656d5c2fea03a1d840bce3b318
-
SHA1
ef13643a9104dd7e8f83e2bb0465d63bfd29594f
-
SHA256
d40788efcdad214c3e3e280d956c1fb0af25dec1502e64f4a0cbe5e6c8676d83
-
SHA512
00180fcb0985cbba2f4feb2da2262b374518acaeb7c4ccae55ca9a4fb715793063b1a64ac704e996bee54846b94185fe7f35cc5d9bda1aefcb291bd75b0f7485
Static task
static1
Behavioral task
behavioral1
Sample
d40788efcdad214c3e3e280d956c1fb0af25dec1502e64f4a0cbe5e6c8676d83.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
raccoon
1c0fad6805a0f65d7b597130eb9f089ffbe9857d
-
url4cnc
http://194.180.191.241/capibar
http://103.155.93.35/capibar
https://t.me/capibar
Targets
-
-
Target
d40788efcdad214c3e3e280d956c1fb0af25dec1502e64f4a0cbe5e6c8676d83
-
Size
714KB
-
MD5
c9acb5656d5c2fea03a1d840bce3b318
-
SHA1
ef13643a9104dd7e8f83e2bb0465d63bfd29594f
-
SHA256
d40788efcdad214c3e3e280d956c1fb0af25dec1502e64f4a0cbe5e6c8676d83
-
SHA512
00180fcb0985cbba2f4feb2da2262b374518acaeb7c4ccae55ca9a4fb715793063b1a64ac704e996bee54846b94185fe7f35cc5d9bda1aefcb291bd75b0f7485
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
-
Suspicious use of SetThreadContext
-