General
-
Target
065a30af4b949ed07c5c1761c7426f79
-
Size
6.9MB
-
Sample
220716-thc6padfel
-
MD5
065a30af4b949ed07c5c1761c7426f79
-
SHA1
a3c706e73d278d6124c70d8cd0392f6c47f2205f
-
SHA256
a48ba6c3447ff9e85c9524ce4a90771735e5ca09c917b74fce272e5ba171e5a7
-
SHA512
a8e4651728bbd94d28c35d2ff757b86d6e986d271a518f4dfdb60b97884f15431abcf2c3c78dd6d2193a9eeaf99564c92099736c85b9a183b153db2c43a1c31f
Static task
static1
Behavioral task
behavioral1
Sample
065a30af4b949ed07c5c1761c7426f79.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
065a30af4b949ed07c5c1761c7426f79.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
raccoon
8f4e4706e9b4e3a904862901d32e2123
http://45.8.145.243/
http://78.159.97.21/
Targets
-
-
Target
065a30af4b949ed07c5c1761c7426f79
-
Size
6.9MB
-
MD5
065a30af4b949ed07c5c1761c7426f79
-
SHA1
a3c706e73d278d6124c70d8cd0392f6c47f2205f
-
SHA256
a48ba6c3447ff9e85c9524ce4a90771735e5ca09c917b74fce272e5ba171e5a7
-
SHA512
a8e4651728bbd94d28c35d2ff757b86d6e986d271a518f4dfdb60b97884f15431abcf2c3c78dd6d2193a9eeaf99564c92099736c85b9a183b153db2c43a1c31f
-
Raccoon Stealer payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-