General
-
Target
f8a35dd9b6f6c23470a5c5902f19a4efdbdfa86c4e18d497fd153872c1cc2471
-
Size
257KB
-
Sample
230731-p75j1sgg2z
-
MD5
bf7d48747998c636f443ab40e5318606
-
SHA1
8f23e2805fb519d9db45e1b78bd8c2f9ac02c6bd
-
SHA256
f8a35dd9b6f6c23470a5c5902f19a4efdbdfa86c4e18d497fd153872c1cc2471
-
SHA512
31dbf067ab2d0e44d048560acb115c6043851e9fcd38a9d8000392c2919429707f182f7a4f648d1c61b5921f2ee1caa88d21826ebde071a991b1da40a4952761
-
SSDEEP
3072:qzRFIg+n32L6cgHgg2lDTnlyOno2g+1MiRfKytq4f1ZDH9Opd:qlFW322cgAgATnJo2h5Zttq4Ls
Static task
static1
Behavioral task
behavioral1
Sample
f8a35dd9b6f6c23470a5c5902f19a4efdbdfa86c4e18d497fd153872c1cc2471.exe
Resource
win10-20230703-en
Malware Config
Extracted
raccoon
c610d498a9c34173052f3f4fcea051af
http://galandskiyher1.com:80/
Targets
-
-
Target
f8a35dd9b6f6c23470a5c5902f19a4efdbdfa86c4e18d497fd153872c1cc2471
-
Size
257KB
-
MD5
bf7d48747998c636f443ab40e5318606
-
SHA1
8f23e2805fb519d9db45e1b78bd8c2f9ac02c6bd
-
SHA256
f8a35dd9b6f6c23470a5c5902f19a4efdbdfa86c4e18d497fd153872c1cc2471
-
SHA512
31dbf067ab2d0e44d048560acb115c6043851e9fcd38a9d8000392c2919429707f182f7a4f648d1c61b5921f2ee1caa88d21826ebde071a991b1da40a4952761
-
SSDEEP
3072:qzRFIg+n32L6cgHgg2lDTnlyOno2g+1MiRfKytq4f1ZDH9Opd:qlFW322cgAgATnJo2h5Zttq4Ls
-
Raccoon Stealer payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-