General
-
Target
756a5e71d847ac5ca8f5847bdc72d228faadf7bd61b2fd6eb3c3026832d12a4f
-
Size
258KB
-
Sample
230731-l8yw3sfd2x
-
MD5
db1a74cb163b304f673c194adcc133e4
-
SHA1
e08546ef2544b10cce83444156e75f2d8628370c
-
SHA256
756a5e71d847ac5ca8f5847bdc72d228faadf7bd61b2fd6eb3c3026832d12a4f
-
SHA512
dcc476f616d0854dd585edadafe8773f6950a436bcfb9db14bd4432bd67f886ab7b83ba1e8c9ef921df09b4774a750b797dc26fa9e6c911f623fd40853f68716
-
SSDEEP
3072:7RF+34S2+aSBZv6/E5u/15/BpstRZc97LL2v3KICN:tFKt2nS/vOLN5/P93L2v3
Static task
static1
Behavioral task
behavioral1
Sample
756a5e71d847ac5ca8f5847bdc72d228faadf7bd61b2fd6eb3c3026832d12a4f.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
raccoon
c610d498a9c34173052f3f4fcea051af
http://galandskiyher1.com:80/
Targets
-
-
Target
756a5e71d847ac5ca8f5847bdc72d228faadf7bd61b2fd6eb3c3026832d12a4f
-
Size
258KB
-
MD5
db1a74cb163b304f673c194adcc133e4
-
SHA1
e08546ef2544b10cce83444156e75f2d8628370c
-
SHA256
756a5e71d847ac5ca8f5847bdc72d228faadf7bd61b2fd6eb3c3026832d12a4f
-
SHA512
dcc476f616d0854dd585edadafe8773f6950a436bcfb9db14bd4432bd67f886ab7b83ba1e8c9ef921df09b4774a750b797dc26fa9e6c911f623fd40853f68716
-
SSDEEP
3072:7RF+34S2+aSBZv6/E5u/15/BpstRZc97LL2v3KICN:tFKt2nS/vOLN5/P93L2v3
-
Raccoon Stealer payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-