General
-
Target
ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103
-
Size
18.8MB
-
Sample
220508-c89txagcaj
-
MD5
3f585b6e93ceacfe8a68e475b86ffc60
-
SHA1
c13519911988d0423c6c531c5ce7f2ba27394cad
-
SHA256
ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103
-
SHA512
f8245c7e729f0ec2e7b0bbf3942089fcd02021adb49d4e625faa8bfb4028b2b5ae7d9183ef3409178d3acd314df8197acc9b5560adaa9374be72099d83c04e82
Static task
static1
Behavioral task
behavioral1
Sample
ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
raccoon
c763e433ef51ff4b6c545800e4ba3b3b1a2ea077
-
url4cnc
https://telete.in/jbitchsucks
Targets
-
-
Target
ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103
-
Size
18.8MB
-
MD5
3f585b6e93ceacfe8a68e475b86ffc60
-
SHA1
c13519911988d0423c6c531c5ce7f2ba27394cad
-
SHA256
ecb96ba977acddb3efab76321b53e4fbd7c31a6b873aca015c2cbecc01008103
-
SHA512
f8245c7e729f0ec2e7b0bbf3942089fcd02021adb49d4e625faa8bfb4028b2b5ae7d9183ef3409178d3acd314df8197acc9b5560adaa9374be72099d83c04e82
-
Modifies security service
-
Raccoon Stealer Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-