General
-
Target
432c2a73d8964d29b539c57e5c7f2d5eda6d4eef667c02e95b4c26a1c37d58e9
-
Size
257KB
-
Sample
230731-s24mbaab4v
-
MD5
9494e546b003b80987a521858553242c
-
SHA1
6bdf37f9bcab9340a1658a27a11ea96b9f290a0d
-
SHA256
432c2a73d8964d29b539c57e5c7f2d5eda6d4eef667c02e95b4c26a1c37d58e9
-
SHA512
4a18355886929fba9729f34f876b5df47391ba3b92014f068623bef3dd335eb153c30bdcf232e7b88677219ef43d0a3e37970870ebdc6a9a3e95478005338f1a
-
SSDEEP
3072:NnRF0+Pf2fNuZIeYY8ltlyOqMf3Z+e8AnJgwjtIMmC4lHD7j1s:NRF3X2VuZVYTltJ/+e8AnJZtIMrOx
Static task
static1
Behavioral task
behavioral1
Sample
432c2a73d8964d29b539c57e5c7f2d5eda6d4eef667c02e95b4c26a1c37d58e9.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
raccoon
c610d498a9c34173052f3f4fcea051af
http://galandskiyher1.com:80/
Targets
-
-
Target
432c2a73d8964d29b539c57e5c7f2d5eda6d4eef667c02e95b4c26a1c37d58e9
-
Size
257KB
-
MD5
9494e546b003b80987a521858553242c
-
SHA1
6bdf37f9bcab9340a1658a27a11ea96b9f290a0d
-
SHA256
432c2a73d8964d29b539c57e5c7f2d5eda6d4eef667c02e95b4c26a1c37d58e9
-
SHA512
4a18355886929fba9729f34f876b5df47391ba3b92014f068623bef3dd335eb153c30bdcf232e7b88677219ef43d0a3e37970870ebdc6a9a3e95478005338f1a
-
SSDEEP
3072:NnRF0+Pf2fNuZIeYY8ltlyOqMf3Z+e8AnJgwjtIMmC4lHD7j1s:NRF3X2VuZVYTltJ/+e8AnJZtIMrOx
-
Raccoon Stealer payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-