General
-
Target
2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi
-
Size
593KB
-
Sample
240529-mt8cmscf99
-
MD5
f21bae4debf2bc660f2fce8285556790
-
SHA1
6febf83452c9c809a34ac32b77e0927c474c5c89
-
SHA256
4394703b75ca6de35ab20fd34d4669955617f9420c95a1191ee0aa7cc5ca997a
-
SHA512
97427930525dd120d06f8ef10affa391a6b262ef1347a51b4fbf7ce64a570ed4515d8b433117d237a68668ea3e16c3d8cdaca6d8f5bb4475ab1aabd64ff980f3
-
SSDEEP
12288:87AVwypN9NnwDLaDHZoFBHq3Ad4Dqo3XWRsauaabCuJ583f:EkX9JwDLaDHZoFs3ACcRQaaGn3f
Behavioral task
behavioral1
Sample
2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
raccoon
1c0fad6805a0f65d7b597130eb9f089ffbe9857d
-
url4cnc
http://194.180.191.241/capibar
http://103.155.93.35/capibar
https://t.me/capibar
Targets
-
-
Target
2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi
-
Size
593KB
-
MD5
f21bae4debf2bc660f2fce8285556790
-
SHA1
6febf83452c9c809a34ac32b77e0927c474c5c89
-
SHA256
4394703b75ca6de35ab20fd34d4669955617f9420c95a1191ee0aa7cc5ca997a
-
SHA512
97427930525dd120d06f8ef10affa391a6b262ef1347a51b4fbf7ce64a570ed4515d8b433117d237a68668ea3e16c3d8cdaca6d8f5bb4475ab1aabd64ff980f3
-
SSDEEP
12288:87AVwypN9NnwDLaDHZoFBHq3Ad4Dqo3XWRsauaabCuJ583f:EkX9JwDLaDHZoFs3ACcRQaaGn3f
-
Raccoon Stealer V1 payload
-
Detects executables packed with ASPack
-
Detects executables referencing many email and collaboration clients. Observed in information stealers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-