General
-
Target
5b66a8d8211d9d2bc3b767518897de1a.exe
-
Size
192KB
-
Sample
220913-lxr96afcd5
-
MD5
5b66a8d8211d9d2bc3b767518897de1a
-
SHA1
f3d25e1403982357a9fcbd1d9a5f9d3630dbdcab
-
SHA256
c5ca6276e6316d413e79af507372eda03930d70d407c9a5d82cc934c4c2e8757
-
SHA512
ad8465853b096a755cc48055650a1595db8e3e83bbab2e85e741421b274031946e5e844f922d1bf60ef34bddaff32a97e739dae0a030a1437f9f64588c6246e4
-
SSDEEP
1536:DmOOfYt5q0TewD39Agpb6AnxNbqzoI+EbpLcInPxXWBSOQ:qRfNTu6AzooI+Ovn4rQ
Static task
static1
Behavioral task
behavioral1
Sample
5b66a8d8211d9d2bc3b767518897de1a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5b66a8d8211d9d2bc3b767518897de1a.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
raccoon
a828bce8fa315d5d5f4368b51eb63131
http://144.76.31.117/
Targets
-
-
Target
5b66a8d8211d9d2bc3b767518897de1a.exe
-
Size
192KB
-
MD5
5b66a8d8211d9d2bc3b767518897de1a
-
SHA1
f3d25e1403982357a9fcbd1d9a5f9d3630dbdcab
-
SHA256
c5ca6276e6316d413e79af507372eda03930d70d407c9a5d82cc934c4c2e8757
-
SHA512
ad8465853b096a755cc48055650a1595db8e3e83bbab2e85e741421b274031946e5e844f922d1bf60ef34bddaff32a97e739dae0a030a1437f9f64588c6246e4
-
SSDEEP
1536:DmOOfYt5q0TewD39Agpb6AnxNbqzoI+EbpLcInPxXWBSOQ:qRfNTu6AzooI+Ovn4rQ
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-