General
-
Target
a16755f89a681ddad2159b3ce0905fdd4b560985c8f9b18a0b90b2331230d4f3
-
Size
23.4MB
-
Sample
220326-h19f3ahha5
-
MD5
27ecfe755d9f6c72d106d159af93819f
-
SHA1
0e9909517e18e5c7130fed45f3768afbd225b697
-
SHA256
a16755f89a681ddad2159b3ce0905fdd4b560985c8f9b18a0b90b2331230d4f3
-
SHA512
fc64b4ce3dcbc48b3f5cda1b84d28d3e12bf8c76eff5f8e2262b20017b222d9354fe82639ab81cda94652bbfe14ccfc7a9764c0d180e9c3ae2e076c939844f6b
Static task
static1
Behavioral task
behavioral1
Sample
a16755f89a681ddad2159b3ce0905fdd4b560985c8f9b18a0b90b2331230d4f3.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
a16755f89a681ddad2159b3ce0905fdd4b560985c8f9b18a0b90b2331230d4f3.exe
Resource
win10v2004-20220310-en
Malware Config
Extracted
raccoon
1.7.1-hotfix
5eaa41b3101d5537f786a35da1878f0d1d760e53
-
url4cnc
https://telete.in/jbitchsucks
Targets
-
-
Target
a16755f89a681ddad2159b3ce0905fdd4b560985c8f9b18a0b90b2331230d4f3
-
Size
23.4MB
-
MD5
27ecfe755d9f6c72d106d159af93819f
-
SHA1
0e9909517e18e5c7130fed45f3768afbd225b697
-
SHA256
a16755f89a681ddad2159b3ce0905fdd4b560985c8f9b18a0b90b2331230d4f3
-
SHA512
fc64b4ce3dcbc48b3f5cda1b84d28d3e12bf8c76eff5f8e2262b20017b222d9354fe82639ab81cda94652bbfe14ccfc7a9764c0d180e9c3ae2e076c939844f6b
-
Modifies security service
-
Raccoon Stealer Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-