General
-
Target
bbb2caf0af90c311481e8adaa3ba114c
-
Size
1.7MB
-
Sample
240308-tqtteabe77
-
MD5
bbb2caf0af90c311481e8adaa3ba114c
-
SHA1
7747f2214cf6eebd4ca3d2b65d6e712f834c25a1
-
SHA256
40fc4b4e73cc9833b565d7f7d089a3d2c46fcd1facb28671863ba25a24f30e9b
-
SHA512
8e77721a03a9ede479e8660b66b6d4f9964ea01917a0e66e80fb5080d1dc8ab492487825fcc6747cdd3ed1c9250c252a4c595dfffa75caf50f608c34287988f5
-
SSDEEP
49152:Fi7AW/dzv2gntybjHgVR9AG3/klc9G5VYHPO0Dt:o7hdygRVR9oaeuvlZ
Behavioral task
behavioral1
Sample
bbb2caf0af90c311481e8adaa3ba114c.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
bbb2caf0af90c311481e8adaa3ba114c
-
Size
1.7MB
-
MD5
bbb2caf0af90c311481e8adaa3ba114c
-
SHA1
7747f2214cf6eebd4ca3d2b65d6e712f834c25a1
-
SHA256
40fc4b4e73cc9833b565d7f7d089a3d2c46fcd1facb28671863ba25a24f30e9b
-
SHA512
8e77721a03a9ede479e8660b66b6d4f9964ea01917a0e66e80fb5080d1dc8ab492487825fcc6747cdd3ed1c9250c252a4c595dfffa75caf50f608c34287988f5
-
SSDEEP
49152:Fi7AW/dzv2gntybjHgVR9AG3/klc9G5VYHPO0Dt:o7hdygRVR9oaeuvlZ
-
Raccoon Stealer V1 payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-