General
-
Target
file.exe
-
Size
290KB
-
Sample
231205-bphewagg38
-
MD5
5c93a4c307c3463bf6ad1b31722f60fb
-
SHA1
58348694acc271b9e9460e7a7b6c09934f512e82
-
SHA256
8d2e1b76ab14be9d7df6935a19f62f22d2cadce9c6c55b87b39cb0fb8ddee0a0
-
SHA512
2e599891d3ba538c5f2bb10930cb2f7e71849da3a483c1b39fb8bb5df2c1c4bda5406fc6970858a66ccba2229a02c5caca6fbc14ff375dc6fa081050aa5b3609
-
SSDEEP
3072:9vXbn6NliVIpdb1m585NwSYtIY2u2r3ImEHT5lDZVZkTkI:tLlV8ZmK5NLYd2Tr4HPDTiT
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
Malware Config
Extracted
smokeloader
2022
http://onualituyrs.org/
http://sumagulituyo.org/
http://snukerukeutit.org/
http://lightseinsteniki.org/
http://liuliuoumumy.org/
http://stualialuyastrelia.net/
http://kumbuyartyty.net/
http://criogetikfenbut.org/
http://tonimiuyaytre.org/
http://tyiuiunuewqy.org/
Extracted
stealc
http://dskflherlkhopihsf.com
-
url_path
/d414f888bed8c202.php
Targets
-
-
Target
file.exe
-
Size
290KB
-
MD5
5c93a4c307c3463bf6ad1b31722f60fb
-
SHA1
58348694acc271b9e9460e7a7b6c09934f512e82
-
SHA256
8d2e1b76ab14be9d7df6935a19f62f22d2cadce9c6c55b87b39cb0fb8ddee0a0
-
SHA512
2e599891d3ba538c5f2bb10930cb2f7e71849da3a483c1b39fb8bb5df2c1c4bda5406fc6970858a66ccba2229a02c5caca6fbc14ff375dc6fa081050aa5b3609
-
SSDEEP
3072:9vXbn6NliVIpdb1m585NwSYtIY2u2r3ImEHT5lDZVZkTkI:tLlV8ZmK5NLYd2Tr4HPDTiT
-
Raccoon Stealer V2 payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-