General
-
Target
8ca229e0d2c917dfb65a6ad3fdc9bb1e842aca544c944206b76c80fe2165e058
-
Size
39.9MB
-
Sample
240321-1dg3eaah37
-
MD5
fd8058fe93fa938472722334f497e920
-
SHA1
9d56a463fb795a3e87b6063d554aa5538a9b31c6
-
SHA256
8ca229e0d2c917dfb65a6ad3fdc9bb1e842aca544c944206b76c80fe2165e058
-
SHA512
d6179132f6bec008a8e84422aa5575bfa97f6e5c0dc6ae18508087c68e67de66896cc11659807ef54305fc4cac8c15626eb013ae62795143b044d87b94c8721b
-
SSDEEP
786432:HpP1TvbDChk+IOyS5Lir9d+woWNo9khkO5yajOAEbPA0GVRbJuah60m1G3Zr0rH:JtrnCFySCd2WhhkO5yuBwY0GVxjh60Cf
Static task
static1
Behavioral task
behavioral1
Sample
8ca229e0d2c917dfb65a6ad3fdc9bb1e842aca544c944206b76c80fe2165e058.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8ca229e0d2c917dfb65a6ad3fdc9bb1e842aca544c944206b76c80fe2165e058.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
raccoon
d4dfe058bb722373a292317097b425f0
http://37.49.230.152:80
http://37.49.230.219:80
-
user_agent
MrBidenNeverKnow
Targets
-
-
Target
8ca229e0d2c917dfb65a6ad3fdc9bb1e842aca544c944206b76c80fe2165e058
-
Size
39.9MB
-
MD5
fd8058fe93fa938472722334f497e920
-
SHA1
9d56a463fb795a3e87b6063d554aa5538a9b31c6
-
SHA256
8ca229e0d2c917dfb65a6ad3fdc9bb1e842aca544c944206b76c80fe2165e058
-
SHA512
d6179132f6bec008a8e84422aa5575bfa97f6e5c0dc6ae18508087c68e67de66896cc11659807ef54305fc4cac8c15626eb013ae62795143b044d87b94c8721b
-
SSDEEP
786432:HpP1TvbDChk+IOyS5Lir9d+woWNo9khkO5yajOAEbPA0GVRbJuah60m1G3Zr0rH:JtrnCFySCd2WhhkO5yuBwY0GVxjh60Cf
-
Raccoon Stealer V2 payload
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-