General
-
Target
tmp
-
Size
89KB
-
Sample
240412-v6zj9scd34
-
MD5
5f670b0585da1ea77525a49c669a7e5c
-
SHA1
7f43665d61a654fb36274c3019f650c74f8ad316
-
SHA256
a67e0fd85783e525a3bf49de0daa241f4d7dca55b04164a2bbb71acfdcb94176
-
SHA512
0e8a43930b0fed4a36a9098b7c53bb50a6020105c9c9e2b9ef1ea6117537b487a4ea435bf34521a538bc62f390d3782fbc3a42a732cc1e674a5bd90371660f41
-
SSDEEP
1536:J7Mj9V+6CfcSFzuX40XVfoenKY3iPCtbkMM2UhKikUGgb6Auf:e3JCfHo4iVfXKuiatbhM2UhKiygb56
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
raccoon
8401e21bbb0060afb24ce21fda90f5cb
http://195.20.16.155:80
-
user_agent
MrBidenNeverKnow
Targets
-
-
Target
tmp
-
Size
89KB
-
MD5
5f670b0585da1ea77525a49c669a7e5c
-
SHA1
7f43665d61a654fb36274c3019f650c74f8ad316
-
SHA256
a67e0fd85783e525a3bf49de0daa241f4d7dca55b04164a2bbb71acfdcb94176
-
SHA512
0e8a43930b0fed4a36a9098b7c53bb50a6020105c9c9e2b9ef1ea6117537b487a4ea435bf34521a538bc62f390d3782fbc3a42a732cc1e674a5bd90371660f41
-
SSDEEP
1536:J7Mj9V+6CfcSFzuX40XVfoenKY3iPCtbkMM2UhKikUGgb6Auf:e3JCfHo4iVfXKuiatbhM2UhKiygb56
Score10/10-
Raccoon Stealer V2 payload
-
Suspicious use of SetThreadContext
-