General
-
Target
daniilcoder_crypted.exe
-
Size
538KB
-
Sample
230716-tlsqjsfe78
-
MD5
82fb3cc145b2b05aa6750513d393a2b2
-
SHA1
97b18db9775fc94ffc6d66f17eb5e3a889203d63
-
SHA256
6d9c24fc94431a1ed496008696fca844cfa262b21a2622651cecf4683a436900
-
SHA512
a46394d9f541fd56e36d43cacbaf10b2eac97b0bcc33a31c6c0d02772547621da7167a5d86fe047337de0d5ca112c0bcb2d6798ecc77c4673c8c835d96c65884
-
SSDEEP
12288:V77crGJ/xyKB9UyTLrY1XROcbzu2qgR0h76Z:R+GJ/zrYHb/R0h7
Static task
static1
Behavioral task
behavioral1
Sample
daniilcoder_crypted.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
daniilcoder_crypted.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
raccoon
f11400b7e6aba41ec29466fc8776c524
http://94.142.138.147:77u
Targets
-
-
Target
daniilcoder_crypted.exe
-
Size
538KB
-
MD5
82fb3cc145b2b05aa6750513d393a2b2
-
SHA1
97b18db9775fc94ffc6d66f17eb5e3a889203d63
-
SHA256
6d9c24fc94431a1ed496008696fca844cfa262b21a2622651cecf4683a436900
-
SHA512
a46394d9f541fd56e36d43cacbaf10b2eac97b0bcc33a31c6c0d02772547621da7167a5d86fe047337de0d5ca112c0bcb2d6798ecc77c4673c8c835d96c65884
-
SSDEEP
12288:V77crGJ/xyKB9UyTLrY1XROcbzu2qgR0h76Z:R+GJ/zrYHb/R0h7
-
Raccoon Stealer payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-