General
-
Target
d1d286e4d020229c0296c49dba5a4c7a4df9b55c62107b6562d41566136096ad
-
Size
6.9MB
-
Sample
220921-mf12eabffn
-
MD5
bfe0d543d420cf99e37637a622c40e3a
-
SHA1
d2c3200c10f5160e0cbf5596e9e2e06e9be2234e
-
SHA256
d1d286e4d020229c0296c49dba5a4c7a4df9b55c62107b6562d41566136096ad
-
SHA512
3cca57962b6c7a9e159516c1b3fde48473f38414f723d2daa3a07fafa9c3b007077423983effa2984c10a0ea9ac0de5b627deef48d3c49e2b37e1a4efe807a94
-
SSDEEP
98304:DoV1lbPsgZi8knR61cdVMNarKMEFhN01jPatcbI/fVb66QUHtSmqvsZRAjq2Iawy:DYJknDdVy9MGN++/fVu6QUkmwsZKjS
Static task
static1
Behavioral task
behavioral1
Sample
d1d286e4d020229c0296c49dba5a4c7a4df9b55c62107b6562d41566136096ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1d286e4d020229c0296c49dba5a4c7a4df9b55c62107b6562d41566136096ad.exe
Resource
win10-20220812-en
Malware Config
Extracted
raccoon
30983d9f29580bfa36d11934e219e205
http://176.124.218.249/
Targets
-
-
Target
d1d286e4d020229c0296c49dba5a4c7a4df9b55c62107b6562d41566136096ad
-
Size
6.9MB
-
MD5
bfe0d543d420cf99e37637a622c40e3a
-
SHA1
d2c3200c10f5160e0cbf5596e9e2e06e9be2234e
-
SHA256
d1d286e4d020229c0296c49dba5a4c7a4df9b55c62107b6562d41566136096ad
-
SHA512
3cca57962b6c7a9e159516c1b3fde48473f38414f723d2daa3a07fafa9c3b007077423983effa2984c10a0ea9ac0de5b627deef48d3c49e2b37e1a4efe807a94
-
SSDEEP
98304:DoV1lbPsgZi8knR61cdVMNarKMEFhN01jPatcbI/fVb66QUHtSmqvsZRAjq2Iawy:DYJknDdVy9MGN++/fVu6QUkmwsZKjS
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-