General
-
Target
zxcv.EXEkstfehhr
-
Size
1004KB
-
Sample
220731-f6wq2sahg2
-
MD5
08802514f3c2c303d54e4a47a8db54f2
-
SHA1
ebe7c3ac64ce312ca370bcd07d49de5ad1369d93
-
SHA256
28455b1a0b29240e95877cff96528b3a196f0cf3a63d9980dc70349cdc0e1e74
-
SHA512
1ce0f58fa1f50debdff44222b70a4870b7ddb76a21f32d78ccecc2315bf005813bfb37032629e4360a928c61479b72237ac792e904b8c34fc089f73d5721f191
Static task
static1
Behavioral task
behavioral1
Sample
zxcv.exe
Resource
win7-20220718-en
Malware Config
Extracted
raccoon
8a4fd4b44997ba634230ba5c422ca9f2
http://193.106.191.146/
http://185.215.113.89/
Extracted
arkei
Default
Targets
-
-
Target
zxcv.EXEkstfehhr
-
Size
1004KB
-
MD5
08802514f3c2c303d54e4a47a8db54f2
-
SHA1
ebe7c3ac64ce312ca370bcd07d49de5ad1369d93
-
SHA256
28455b1a0b29240e95877cff96528b3a196f0cf3a63d9980dc70349cdc0e1e74
-
SHA512
1ce0f58fa1f50debdff44222b70a4870b7ddb76a21f32d78ccecc2315bf005813bfb37032629e4360a928c61479b72237ac792e904b8c34fc089f73d5721f191
-
Raccoon Stealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-