General
-
Target
file.exe
-
Size
8.3MB
-
Sample
221202-s4tj5abd73
-
MD5
28cfaceff27b7b3f38c6cea6a4749158
-
SHA1
6f7e102986704634a4cc59418a3d6c3aa3245aed
-
SHA256
26cb5be0ae5f89583845a9356dc92637974c0d05951cb52f21865c7b659ff26a
-
SHA512
46e6011df46ebf05db86981f42390fd60d5ae3ed8ad1fd19f6f342011ba68392cadd3028931e83d3430914a5473133471a20161b2c9de62f0be1090b6217d402
-
SSDEEP
196608:/1Cb1InlEuQSJWKOpGUQwVLu7kOBu/d1oetOekv6J:/1Cb+lEutJFOpGUQwV6aoetRJ
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
raccoon
64b445f2d85b7aeb3d5c7b23112d6ac3
http://45.15.156.105/
Targets
-
-
Target
file.exe
-
Size
8.3MB
-
MD5
28cfaceff27b7b3f38c6cea6a4749158
-
SHA1
6f7e102986704634a4cc59418a3d6c3aa3245aed
-
SHA256
26cb5be0ae5f89583845a9356dc92637974c0d05951cb52f21865c7b659ff26a
-
SHA512
46e6011df46ebf05db86981f42390fd60d5ae3ed8ad1fd19f6f342011ba68392cadd3028931e83d3430914a5473133471a20161b2c9de62f0be1090b6217d402
-
SSDEEP
196608:/1Cb1InlEuQSJWKOpGUQwVLu7kOBu/d1oetOekv6J:/1Cb+lEutJFOpGUQwV6aoetRJ
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-