General
-
Target
file.exe
-
Size
5.1MB
-
Sample
220919-ygy4zsachq
-
MD5
ce373f2f096321c70bfb037b60a2c06b
-
SHA1
9ccc9e1c5f14cd27786865e9138bb5b06f3b6e37
-
SHA256
64873bbbafb8c0ad8c19c42ea9f2b7b7f2e6760e68d6a249e75d60820fa42230
-
SHA512
bd99f4c6cd9fa08c68c1bd053a03ae9e5d3164bb5eb144048873d29f6ba975089c6c843765dcbe51c3ae8a4cbb11a400ca6ec4ea2fc7bbb1c660d74c8bfca899
-
SSDEEP
98304:V/jVdoPSbvMPgQ2VRnyXvPv3OiqwZsIqmUjrvVM+fssxp:V/jYMvMoQ+y3v3OijZDENvfDxp
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
raccoon
�6����
Extracted
raccoon
4412608c980868ef83d64b20a2e3d5f8
http://89.185.85.53/
Targets
-
-
Target
file.exe
-
Size
5.1MB
-
MD5
ce373f2f096321c70bfb037b60a2c06b
-
SHA1
9ccc9e1c5f14cd27786865e9138bb5b06f3b6e37
-
SHA256
64873bbbafb8c0ad8c19c42ea9f2b7b7f2e6760e68d6a249e75d60820fa42230
-
SHA512
bd99f4c6cd9fa08c68c1bd053a03ae9e5d3164bb5eb144048873d29f6ba975089c6c843765dcbe51c3ae8a4cbb11a400ca6ec4ea2fc7bbb1c660d74c8bfca899
-
SSDEEP
98304:V/jVdoPSbvMPgQ2VRnyXvPv3OiqwZsIqmUjrvVM+fssxp:V/jYMvMoQ+y3v3OijZDENvfDxp
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-