General
-
Target
04a75ab7363eacb0899e4887a2a420eb
-
Size
1.4MB
-
Sample
231219-mfjgcsced6
-
MD5
04a75ab7363eacb0899e4887a2a420eb
-
SHA1
29fb58f038da2f85aa025b0af012b1088d4ba7ac
-
SHA256
3bd323cd4afb7082d04387b7381ecd19f2240104c56b8c2c8efed770c276105b
-
SHA512
6f1698518550c6480a99ee9b7038ceee87976fdce84b0849b60e73111e895b9782f18c9463f24e149a3b12db7bbdc22f2d132342e24e432dbdc2a08a14dbc99b
-
SSDEEP
24576:1p0a41sZb77n6Zv40QIi4BMvZqU13/Ya2Qq/OJBCoHMCbThYfbFBGBZy0yZBpydQ:QfdgpMcTsGhm5BF0y/+PTJu
Static task
static1
Behavioral task
behavioral1
Sample
04a75ab7363eacb0899e4887a2a420eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04a75ab7363eacb0899e4887a2a420eb.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
raccoon
1.8.2
6b473ae90575e46165b57807704d00b90b7f6fb2
-
url4cnc
http://teletop.top/viv0ramadium0
http://teleta.top/viv0ramadium0
https://t.me/viv0ramadium0
Targets
-
-
Target
04a75ab7363eacb0899e4887a2a420eb
-
Size
1.4MB
-
MD5
04a75ab7363eacb0899e4887a2a420eb
-
SHA1
29fb58f038da2f85aa025b0af012b1088d4ba7ac
-
SHA256
3bd323cd4afb7082d04387b7381ecd19f2240104c56b8c2c8efed770c276105b
-
SHA512
6f1698518550c6480a99ee9b7038ceee87976fdce84b0849b60e73111e895b9782f18c9463f24e149a3b12db7bbdc22f2d132342e24e432dbdc2a08a14dbc99b
-
SSDEEP
24576:1p0a41sZb77n6Zv40QIi4BMvZqU13/Ya2Qq/OJBCoHMCbThYfbFBGBZy0yZBpydQ:QfdgpMcTsGhm5BF0y/+PTJu
-
Raccoon Stealer V1 payload
-
Suspicious use of SetThreadContext
-