General
-
Target
63e344068b6c43cbad89fefbbd854a7cf4a92144af055b5da69b496bf98bc006
-
Size
257KB
-
Sample
230731-tm6zkahd37
-
MD5
a23f17607b1c7f209dd5eebc974886a8
-
SHA1
8e589283d9713526059d58c326959ca6bf88a264
-
SHA256
63e344068b6c43cbad89fefbbd854a7cf4a92144af055b5da69b496bf98bc006
-
SHA512
0fd7e3e6e09df001bf17098957b221ccbc07547ab9206ff5e850c94045f2f76243994546ffb0bfd72ccfc1ee8086526d28e638bcc29c516a59df6045301d1fe3
-
SSDEEP
3072:SRF07Rd1VNx4r2otf3Whp0FVNoVKru2lLH4jsuFO6Or8LEbw:wFST1VNx4rpuhTVKa2pEdIr/
Static task
static1
Behavioral task
behavioral1
Sample
63e344068b6c43cbad89fefbbd854a7cf4a92144af055b5da69b496bf98bc006.exe
Resource
win10-20230703-en
Malware Config
Extracted
raccoon
c610d498a9c34173052f3f4fcea051af
http://galandskiyher1.com:80/
Targets
-
-
Target
63e344068b6c43cbad89fefbbd854a7cf4a92144af055b5da69b496bf98bc006
-
Size
257KB
-
MD5
a23f17607b1c7f209dd5eebc974886a8
-
SHA1
8e589283d9713526059d58c326959ca6bf88a264
-
SHA256
63e344068b6c43cbad89fefbbd854a7cf4a92144af055b5da69b496bf98bc006
-
SHA512
0fd7e3e6e09df001bf17098957b221ccbc07547ab9206ff5e850c94045f2f76243994546ffb0bfd72ccfc1ee8086526d28e638bcc29c516a59df6045301d1fe3
-
SSDEEP
3072:SRF07Rd1VNx4r2otf3Whp0FVNoVKru2lLH4jsuFO6Or8LEbw:wFST1VNx4rpuhTVKa2pEdIr/
-
Raccoon Stealer payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-