General
-
Target
installer.zip
-
Size
15.6MB
-
Sample
220729-f2d1faedg8
-
MD5
d7268f23c90ec40e6f102f46bfdff29d
-
SHA1
e4980fa6e09d0fb84e9cf1350ed48d263fc87c59
-
SHA256
f2a14fa74eb7d5752ecd5b578720883c3f48909e2fa81aaff1dbafff610e3257
-
SHA512
f96009601c258c07c15039a5f7a45be63c5ad24d97416c38493b0a62c5ad43b273c16980b64da46db2cb029d9dedd5a2b80a15298ccedf43bf0f09889ecc8483
Static task
static1
Behavioral task
behavioral1
Sample
installer.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
installer.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
raccoon
f0f70bdf46d27a5d3e549f9105928f1a
http://87.120.37.15/
Targets
-
-
Target
installer.exe
-
Size
735.1MB
-
MD5
f32cd33269e2eee752aa32c83b341d53
-
SHA1
4d7f4cd9e38248b1cb68357150b81faaeacd5380
-
SHA256
f732e864793731491b83cccd4a8e33d45370bb391ae3fd60f38a039cebb29749
-
SHA512
82bed41dd116031896ee02b5e2e8e89cfbdffc0bb647f58658c6fe274fe0b51ef2383cdb37091389c0b6d1e55682d64ebf70d6c612d7a651b7fe752b38817979
-
Raccoon Stealer payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-