General
-
Target
cdf1d36e5d566314e0f5f09b5bd32845
-
Size
487KB
-
Sample
240316-njlassaa4w
-
MD5
cdf1d36e5d566314e0f5f09b5bd32845
-
SHA1
cc31a7ff37220a8e715450cb8a857be907c44d0d
-
SHA256
4507bfc9e523a0d650c1db2ab088af56de093bde9af54687deeaebe4a3e014c1
-
SHA512
8c3a7de502efed9372396be6386d4166a396411a3748094d42c67c3c55c2d61308ad8239db7e80a23ec2b52d1bf9ee43ad2d3fe87d67a079c1298d6a847273fd
-
SSDEEP
12288:gDCBS+Tf513C//CVgG56h+PCQXNQCYM5muZOb:gQ33C//C+gPC9M5muZOb
Static task
static1
Behavioral task
behavioral1
Sample
cdf1d36e5d566314e0f5f09b5bd32845.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cdf1d36e5d566314e0f5f09b5bd32845.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
raccoon
1.7.3
b19ab3b3bd39b9aebee9d40611a5758426085c48
-
url4cnc
https://telete.in/indochipropertw
Targets
-
-
Target
cdf1d36e5d566314e0f5f09b5bd32845
-
Size
487KB
-
MD5
cdf1d36e5d566314e0f5f09b5bd32845
-
SHA1
cc31a7ff37220a8e715450cb8a857be907c44d0d
-
SHA256
4507bfc9e523a0d650c1db2ab088af56de093bde9af54687deeaebe4a3e014c1
-
SHA512
8c3a7de502efed9372396be6386d4166a396411a3748094d42c67c3c55c2d61308ad8239db7e80a23ec2b52d1bf9ee43ad2d3fe87d67a079c1298d6a847273fd
-
SSDEEP
12288:gDCBS+Tf513C//CVgG56h+PCQXNQCYM5muZOb:gQ33C//C+gPC9M5muZOb
-
Raccoon Stealer V1 payload
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of SetThreadContext
-