General
-
Target
4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1
-
Size
8.1MB
-
Sample
240624-k4n1msxhmm
-
MD5
ac8a5010569727ed6f4d02cbb4dc7879
-
SHA1
6a7ed927eb14e661d01b707bf9454a28f962b3dc
-
SHA256
4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1
-
SHA512
8b14647d6d3d82fec3a83c680b1371dae5ead249e5b7b068bbd713cd157c85f58afc51eaa08c6fd82a70e3858a7d472e11ddd688223d5fa8cc54109750a07d8b
-
SSDEEP
196608:BGRahMaJLQTXCZ6z02V2eipAVpEXGpJYChuRGApVh:EtaJUeYzZV2eipApTER3bh
Static task
static1
Behavioral task
behavioral1
Sample
4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1
-
Size
8.1MB
-
MD5
ac8a5010569727ed6f4d02cbb4dc7879
-
SHA1
6a7ed927eb14e661d01b707bf9454a28f962b3dc
-
SHA256
4af369f90014bcd5fb502f18d0dc27c530acb89170d12f76e15f5d2dd6d957b1
-
SHA512
8b14647d6d3d82fec3a83c680b1371dae5ead249e5b7b068bbd713cd157c85f58afc51eaa08c6fd82a70e3858a7d472e11ddd688223d5fa8cc54109750a07d8b
-
SSDEEP
196608:BGRahMaJLQTXCZ6z02V2eipAVpEXGpJYChuRGApVh:EtaJUeYzZV2eipApTER3bh
-
Raccoon Stealer V1 payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-