General
-
Target
5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648
-
Size
395.1MB
-
Sample
220907-jtgm5sbdb2
-
MD5
6e304cd6d12c0d31869ed6e45fff4633
-
SHA1
a5bb3c851cbf05c88357074ea66e272f839d0537
-
SHA256
5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648
-
SHA512
8ba2a27800e5062ee96d1f3a6f1485584c6762276a2016d7f02c3f33201fd664c77f27d47ec3c8706eed6ba3661116c95aff1213d544f792f83640412b97a1f5
-
SSDEEP
196608:8YUmSslap7QMHe5HhVrHI/dl/v9TtZJD05y:ldEdCzrHSbv9troy
Static task
static1
Behavioral task
behavioral1
Sample
5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
raccoon
8eb14caca01131f5f4ff62ef8a0fcab4
http://74.119.192.56/
http://146.19.170.153/
Targets
-
-
Target
5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648
-
Size
395.1MB
-
MD5
6e304cd6d12c0d31869ed6e45fff4633
-
SHA1
a5bb3c851cbf05c88357074ea66e272f839d0537
-
SHA256
5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648
-
SHA512
8ba2a27800e5062ee96d1f3a6f1485584c6762276a2016d7f02c3f33201fd664c77f27d47ec3c8706eed6ba3661116c95aff1213d544f792f83640412b97a1f5
-
SSDEEP
196608:8YUmSslap7QMHe5HhVrHI/dl/v9TtZJD05y:ldEdCzrHSbv9troy
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-