General
-
Target
123.exe
-
Size
6.9MB
-
Sample
220729-e64k8aeghp
-
MD5
859e1182c2ff316f92ec990c18fff2a0
-
SHA1
ee2b75886ec48732c0d73827f82753bd8784b836
-
SHA256
dd4cedc22c0a03d06a02e0fa290c8d9243e5a369a686f825036f54a5e02a4b9f
-
SHA512
76b9af5f976c3612e3c4fd957802b2d1825259e517a96f09f67fc4a27a95b0421d82aab8aefd9b738c45259c11957e407f5145a105eb4a2db37eeae81760b9c5
Static task
static1
Behavioral task
behavioral1
Sample
123.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
123.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
raccoon
febdbfd13097e2af1fd5f65e42403621
http://193.43.147.132
Targets
-
-
Target
123.exe
-
Size
6.9MB
-
MD5
859e1182c2ff316f92ec990c18fff2a0
-
SHA1
ee2b75886ec48732c0d73827f82753bd8784b836
-
SHA256
dd4cedc22c0a03d06a02e0fa290c8d9243e5a369a686f825036f54a5e02a4b9f
-
SHA512
76b9af5f976c3612e3c4fd957802b2d1825259e517a96f09f67fc4a27a95b0421d82aab8aefd9b738c45259c11957e407f5145a105eb4a2db37eeae81760b9c5
-
Raccoon Stealer payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-