General
-
Target
Installer.exe
-
Size
1000KB
-
Sample
220831-c6v8qsfgbj
-
MD5
6ffb07e3414cd88275cd4c3b8bbe7b5e
-
SHA1
0b5f524c0478d84860d16c786358ebda166a5ee1
-
SHA256
f93521d653a724f562be130f117f3e7ee1b87eeab357f3c5695812a4a9ea73a5
-
SHA512
ec9f389f258b2553b52c68ea602c55aacd0d1ed052b17d63b7ca5324b2bccfab97e843d540baea9628f15dc9a798b58512218921373f535815093351f2388885
-
SSDEEP
12288:jylN+SwBxYRjRGLFA8gpO4Xspi5n/IxrcBWQzf7x:jDSw/RsWe1W4
Static task
static1
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Installer.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
raccoon
4689c837190317f8309bc798897decf7
http://91.234.254.126/
Targets
-
-
Target
Installer.exe
-
Size
1000KB
-
MD5
6ffb07e3414cd88275cd4c3b8bbe7b5e
-
SHA1
0b5f524c0478d84860d16c786358ebda166a5ee1
-
SHA256
f93521d653a724f562be130f117f3e7ee1b87eeab357f3c5695812a4a9ea73a5
-
SHA512
ec9f389f258b2553b52c68ea602c55aacd0d1ed052b17d63b7ca5324b2bccfab97e843d540baea9628f15dc9a798b58512218921373f535815093351f2388885
-
SSDEEP
12288:jylN+SwBxYRjRGLFA8gpO4Xspi5n/IxrcBWQzf7x:jDSw/RsWe1W4
-
YTStealer payload
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-