General
-
Target
39245735a6a4d2495cb6a5207bb9d5e2b6c058d113b6b0efc292330a89611757
-
Size
47KB
-
Sample
240308-e7mzvsfc64
-
MD5
f1e075f8cebe5aaca53ed7c158d81cbd
-
SHA1
11f80b386b8a04a4f82d065cefb634bb389e9dbd
-
SHA256
39245735a6a4d2495cb6a5207bb9d5e2b6c058d113b6b0efc292330a89611757
-
SHA512
12b1d894dd8fd2e9c595458a9b4b7098821a642fdc27c6044b84c8c26784ca161957a7b1f934a7253be9737af031bfa15f7436d0776126eec608131924cba192
-
SSDEEP
768:7w5fIJQ5UMuXyicwVI7b8kgUUL8L/aUW/seidZhPlqEFiRT:sVp5UMuXy9wowR8tR/lqeip
Static task
static1
Behavioral task
behavioral1
Sample
39245735a6a4d2495cb6a5207bb9d5e2b6c058d113b6b0efc292330a89611757.exe
Resource
win7-20231129-en
Malware Config
Extracted
raccoon
-
user_agent
f
Extracted
raccoon
4ddee039c3c1cb01baf0736505e3e436
http://94.131.106.24:80
-
user_agent
MrBidenNeverKnow
Targets
-
-
Target
39245735a6a4d2495cb6a5207bb9d5e2b6c058d113b6b0efc292330a89611757
-
Size
47KB
-
MD5
f1e075f8cebe5aaca53ed7c158d81cbd
-
SHA1
11f80b386b8a04a4f82d065cefb634bb389e9dbd
-
SHA256
39245735a6a4d2495cb6a5207bb9d5e2b6c058d113b6b0efc292330a89611757
-
SHA512
12b1d894dd8fd2e9c595458a9b4b7098821a642fdc27c6044b84c8c26784ca161957a7b1f934a7253be9737af031bfa15f7436d0776126eec608131924cba192
-
SSDEEP
768:7w5fIJQ5UMuXyicwVI7b8kgUUL8L/aUW/seidZhPlqEFiRT:sVp5UMuXy9wowR8tR/lqeip
-
Glupteba payload
-
Raccoon Stealer V2 payload
-
Contacts a large (4800) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies boot configuration data using bcdedit
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Drops startup file
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1