General
-
Target
732755d843b3ac08712a857e090dbd5e7149edc9ca5cb9ad2c144e83ab98560e
-
Size
257KB
-
Sample
230731-hzmwnsdb85
-
MD5
889b4d4156539e6ded3ee6b5d323d0fd
-
SHA1
6984e63f73bcaa03775736929b7249f147bb7e95
-
SHA256
732755d843b3ac08712a857e090dbd5e7149edc9ca5cb9ad2c144e83ab98560e
-
SHA512
d5dd7088c2a2b4ef4e4a72682cb01cea645cef09d41759031cbbfc028c1c7d437ee93c8cd149be2b076ebb198b5584e4b83b2e42a2bfc3bc57f7f8f7e307c98a
-
SSDEEP
3072:JRFbvxW2cSLCqngKJUW3cMHdvxFjMW+nKDR9D:nFD82xLzndLMMHNY
Static task
static1
Behavioral task
behavioral1
Sample
732755d843b3ac08712a857e090dbd5e7149edc9ca5cb9ad2c144e83ab98560e.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
raccoon
c610d498a9c34173052f3f4fcea051af
http://galandskiyher1.com:80/
Targets
-
-
Target
732755d843b3ac08712a857e090dbd5e7149edc9ca5cb9ad2c144e83ab98560e
-
Size
257KB
-
MD5
889b4d4156539e6ded3ee6b5d323d0fd
-
SHA1
6984e63f73bcaa03775736929b7249f147bb7e95
-
SHA256
732755d843b3ac08712a857e090dbd5e7149edc9ca5cb9ad2c144e83ab98560e
-
SHA512
d5dd7088c2a2b4ef4e4a72682cb01cea645cef09d41759031cbbfc028c1c7d437ee93c8cd149be2b076ebb198b5584e4b83b2e42a2bfc3bc57f7f8f7e307c98a
-
SSDEEP
3072:JRFbvxW2cSLCqngKJUW3cMHdvxFjMW+nKDR9D:nFD82xLzndLMMHNY
-
Raccoon Stealer payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-