General
-
Target
racoon.zip
-
Size
12.2MB
-
Sample
230203-fa747seb9s
-
MD5
bd09817d3b7c8cd4da75a129241d804c
-
SHA1
36467232ab8182e019d6dcbff44c709efcdca066
-
SHA256
c195423817e1d8e44acc60674ce93d201aa9e9b4545e09066cf60ca169a5056f
-
SHA512
fb3a214bc3207cded13eb6cc7cfb95e136bc35fa279d8e59c85ba289478dc9bebcbd32dbd62a1dd354cf61e7dd4ad4a3b9fb5a6f58ac0507e74bcb83ea3adb8c
-
SSDEEP
196608:5rs87MYbQ2K69kuTaTYNteSZKtN7JnJ47HnN3xntRnw91mYC7jBKKfT6I1ZN:HYh2K69krTYXernJmt3JtCiJzD
Behavioral task
behavioral1
Sample
racoon/36ac3acd8c3eb0bb7d642d61ec4cc0e1a61eeae335c1c2d7e759d97233c60527.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
racoon/5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
racoon/8079c95b3f0f302dc9adacdca42cc85d3961e3568406ef84ce61954df7208f9a.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
raccoon
8eb14caca01131f5f4ff62ef8a0fcab4
http://45.89.54.95/
http://45.89.54.25/
http://74.119.192.56/
http://146.19.170.153/
http://185.53.46.76/
http://5.182.39.34/
Targets
-
-
Target
racoon/36ac3acd8c3eb0bb7d642d61ec4cc0e1a61eeae335c1c2d7e759d97233c60527.bin
-
Size
394.7MB
-
MD5
3b1cbceeeeb2afe955e3d9eb8aebfe2d
-
SHA1
a184bb6d82236bd928707fe1a54f8aa30af025c7
-
SHA256
36ac3acd8c3eb0bb7d642d61ec4cc0e1a61eeae335c1c2d7e759d97233c60527
-
SHA512
4c0ae900b351e92c16aee7fa6480c1850a03d6911926ce60eda1df9e292b5f556782e7eb2fabfc6bb63ac7f88223eb7b7e38487efb65e70b376899c848b71b47
-
SSDEEP
49152:WNEe0GkOi1F6eQ+ydT+jLdhYiGS29SVPNpLnZRVhYXj/2YROvymC0DLG:WNEezKfdBhs+PnVhYyYROvyym
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
racoon/5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648.bin
-
Size
395.1MB
-
MD5
6e304cd6d12c0d31869ed6e45fff4633
-
SHA1
a5bb3c851cbf05c88357074ea66e272f839d0537
-
SHA256
5ecffed4d2c1e2535b69ea9ed0216606203f712e3e8ef9a3af2ca0b5762ea648
-
SHA512
8ba2a27800e5062ee96d1f3a6f1485584c6762276a2016d7f02c3f33201fd664c77f27d47ec3c8706eed6ba3661116c95aff1213d544f792f83640412b97a1f5
-
SSDEEP
196608:8YUmSslap7QMHe5HhVrHI/dl/v9TtZJD05y:ldEdCzrHSbv9troy
Score10/10 -
-
-
Target
racoon/8079c95b3f0f302dc9adacdca42cc85d3961e3568406ef84ce61954df7208f9a.bin
-
Size
2.2MB
-
MD5
2e6450058b2871bf5888d45d67a4758c
-
SHA1
550fd5fc040b4218ced382e945620bc42572b5ff
-
SHA256
8079c95b3f0f302dc9adacdca42cc85d3961e3568406ef84ce61954df7208f9a
-
SHA512
9333341e5bb13d0584688dd25d24c50bbf78059b6ade4fbc1b1701c1c2f484582188bf6e99a7879d8e93a95296cf277477b63330355fcc0923b2e65ebd23be31
-
SSDEEP
49152:SNlw9lnFTn7de6J503GljSdm1BG1KFwutMZMVVSkLZdP3Gl:S87Fr7oq26Ok1BwKF3nUkLZdP
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-