General
-
Target
installer.exe
-
Size
15.5MB
-
Sample
220729-gfx2vsefb2
-
MD5
c35a4089299c96b97eb1257c9cfeeb7d
-
SHA1
dbfbfec2fb507ab71cfa3cf25d0016a3e233a2a3
-
SHA256
86c18ece485bd831afd99d3306c5a7944d34f3b36974458d390a76d7280d416b
-
SHA512
fa0352da4f4b61aed28c915f5b0e55bc135a8773e229f38fb5b979d74be4749720724123944749bb1186d0f6edd44f4103e42818acddcb3006f05e484d18ec92
Static task
static1
Behavioral task
behavioral1
Sample
installer.exe
Resource
win7-20220718-en
Malware Config
Extracted
raccoon
f0f70bdf46d27a5d3e549f9105928f1a
http://87.120.37.15/
Targets
-
-
Target
installer.exe
-
Size
15.5MB
-
MD5
c35a4089299c96b97eb1257c9cfeeb7d
-
SHA1
dbfbfec2fb507ab71cfa3cf25d0016a3e233a2a3
-
SHA256
86c18ece485bd831afd99d3306c5a7944d34f3b36974458d390a76d7280d416b
-
SHA512
fa0352da4f4b61aed28c915f5b0e55bc135a8773e229f38fb5b979d74be4749720724123944749bb1186d0f6edd44f4103e42818acddcb3006f05e484d18ec92
-
Raccoon Stealer payload
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-