General
-
Target
file.exe
-
Size
168KB
-
Sample
221103-x2m2sagcgl
-
MD5
9ed169f48558d35880887d9d0b721fe3
-
SHA1
007ae0c669af551f3da3fc5ee1ce22207a4a55ba
-
SHA256
b8a0a0d472bfa63a3a41fb6a321a73874460a4e25971959c64450d1da3aacc91
-
SHA512
717c56fb4dff0280385cecae2401a2c641722e8f475a508f445273b0fb6b2bd62ccca6e28affcc38834896344dddf129043131c32d6c8635b1f068ec10cef0db
-
SSDEEP
3072:bHs0NSdrijCoXXp6lFb00lDxpMk8L9u3Lqg45ZJDmBo666f:DLSNcCoewYGrJuD66f
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
raccoon
4b27964206623c95a4fe31c61b7b4527
http://79.137.197.212/
Targets
-
-
Target
file.exe
-
Size
168KB
-
MD5
9ed169f48558d35880887d9d0b721fe3
-
SHA1
007ae0c669af551f3da3fc5ee1ce22207a4a55ba
-
SHA256
b8a0a0d472bfa63a3a41fb6a321a73874460a4e25971959c64450d1da3aacc91
-
SHA512
717c56fb4dff0280385cecae2401a2c641722e8f475a508f445273b0fb6b2bd62ccca6e28affcc38834896344dddf129043131c32d6c8635b1f068ec10cef0db
-
SSDEEP
3072:bHs0NSdrijCoXXp6lFb00lDxpMk8L9u3Lqg45ZJDmBo666f:DLSNcCoewYGrJuD66f
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-