General
-
Target
eb8455a49caa35beaa645fb26a4b760a84e2abcce810b9261518fc978d6027c9
-
Size
5.1MB
-
Sample
230918-lnbwtaah26
-
MD5
8f7c7aadf506d8850c65d6fad2646438
-
SHA1
0d45d3ea30740a2a6df523396cf143dd59ebeec7
-
SHA256
eb8455a49caa35beaa645fb26a4b760a84e2abcce810b9261518fc978d6027c9
-
SHA512
17e1a00dd04694a95760c93e20d878e5956b215ecff1eb5dba917719ddff8587d9fddeb0bd7008a6e248859a83d2446310f8fc4cfddbcd44cb4ca2b1f6b4bf53
-
SSDEEP
98304:sbpLElLpmF74U66BS5vdypRR67nVUEFUCfbN1xi0zCB/Rr97XJ:sbpLEFpmKU66BYVyr4nV7+Crxi0Ur9T
Malware Config
Targets
-
-
Target
eb8455a49caa35beaa645fb26a4b760a84e2abcce810b9261518fc978d6027c9
-
Size
5.1MB
-
MD5
8f7c7aadf506d8850c65d6fad2646438
-
SHA1
0d45d3ea30740a2a6df523396cf143dd59ebeec7
-
SHA256
eb8455a49caa35beaa645fb26a4b760a84e2abcce810b9261518fc978d6027c9
-
SHA512
17e1a00dd04694a95760c93e20d878e5956b215ecff1eb5dba917719ddff8587d9fddeb0bd7008a6e248859a83d2446310f8fc4cfddbcd44cb4ca2b1f6b4bf53
-
SSDEEP
98304:sbpLElLpmF74U66BS5vdypRR67nVUEFUCfbN1xi0zCB/Rr97XJ:sbpLEFpmKU66BYVyr4nV7+Crxi0Ur9T
-
Raccoon Stealer payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-