General
-
Target
c4395ae438ce235952f56642e133750c1fbcfc01275e77402425f549cdd2805dexe_JC.exe
-
Size
286KB
-
Sample
230811-sx7heaed35
-
MD5
a909e4d61084420f40d41fe5afd2fa4f
-
SHA1
5877fdfaae37b7ae6bac595d56ce66a2e48840cd
-
SHA256
c4395ae438ce235952f56642e133750c1fbcfc01275e77402425f549cdd2805d
-
SHA512
339ec1cd7555cc6d9bc22e426ec9f83bcf06a18ca6000bbf9835843723ee91689adb0223ce7d9e0ee3943a24611bf8bf30d209d5745dbe124dca8b0da34378cb
-
SSDEEP
3072:iN22+03zuDia6L/KoWAH94blZz1Xw4dsyJx1EVD3G8yhjg98fZbFPVsBTY:+TYi5LCmolZNJ+S1EV6P2GVy
Static task
static1
Behavioral task
behavioral1
Sample
c4395ae438ce235952f56642e133750c1fbcfc01275e77402425f549cdd2805dexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c4395ae438ce235952f56642e133750c1fbcfc01275e77402425f549cdd2805dexe_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
raccoon
c610d498a9c34173052f3f4fcea051af
http://galandskiyher1.com:80/
Targets
-
-
Target
c4395ae438ce235952f56642e133750c1fbcfc01275e77402425f549cdd2805dexe_JC.exe
-
Size
286KB
-
MD5
a909e4d61084420f40d41fe5afd2fa4f
-
SHA1
5877fdfaae37b7ae6bac595d56ce66a2e48840cd
-
SHA256
c4395ae438ce235952f56642e133750c1fbcfc01275e77402425f549cdd2805d
-
SHA512
339ec1cd7555cc6d9bc22e426ec9f83bcf06a18ca6000bbf9835843723ee91689adb0223ce7d9e0ee3943a24611bf8bf30d209d5745dbe124dca8b0da34378cb
-
SSDEEP
3072:iN22+03zuDia6L/KoWAH94blZz1Xw4dsyJx1EVD3G8yhjg98fZbFPVsBTY:+TYi5LCmolZNJ+S1EV6P2GVy
-
Raccoon Stealer payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-