General
-
Target
vb72c2.exe
-
Size
1.0MB
-
Sample
240707-pgxfqasanr
-
MD5
f7f6eb480fe715733e509d0489171c18
-
SHA1
e28a03d8c62eae2687d8d8f6b6ccb73377bc1a48
-
SHA256
3898534fa62f5a8f169c66900f183e5637e7c4f9be8c46591568ff489bc432d4
-
SHA512
962a440c8b5e148821e5db065bddcf861899667319ff1d3ad497e7629c6212235e51d1902d4685af6248f83f7c4a8a1c2dc9805f58c5a27a87a40067e5792988
-
SSDEEP
24576:BW9a/w9mj+Nhf+x+eswsX08cjwPBXMX7pCeg8nr5G79Bgx+:BWYWNQUe3sX0OPuXV1vnAwx+
Behavioral task
behavioral1
Sample
vb72c2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
vb72c2.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
vb72c2.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral4
Sample
vb72c2.exe
Resource
win11-20240704-en
Malware Config
Extracted
raccoon
23b7de51bb42a569733f1e26dbce63ba
http://95.169.205.186:80/
-
user_agent
MrBidenNeverKnow
Targets
-
-
Target
vb72c2.exe
-
Size
1.0MB
-
MD5
f7f6eb480fe715733e509d0489171c18
-
SHA1
e28a03d8c62eae2687d8d8f6b6ccb73377bc1a48
-
SHA256
3898534fa62f5a8f169c66900f183e5637e7c4f9be8c46591568ff489bc432d4
-
SHA512
962a440c8b5e148821e5db065bddcf861899667319ff1d3ad497e7629c6212235e51d1902d4685af6248f83f7c4a8a1c2dc9805f58c5a27a87a40067e5792988
-
SSDEEP
24576:BW9a/w9mj+Nhf+x+eswsX08cjwPBXMX7pCeg8nr5G79Bgx+:BWYWNQUe3sX0OPuXV1vnAwx+
-
Raccoon Stealer V2 payload
-
Suspicious use of SetThreadContext
-