General
-
Target
2024-07-25_96fc916421245c96a28cc6e899fea82a_avoslocker_cobalt-strike_raccoonstealer_wapomi
-
Size
593KB
-
Sample
240725-l1z46sscnp
-
MD5
96fc916421245c96a28cc6e899fea82a
-
SHA1
88cb3af4ef16e0a98048664b063c5b2403b3a40a
-
SHA256
366f0e781208b8d55d0ececca535ed31be636e1609a655ffa9d5fc1b6587395b
-
SHA512
bfc6cb21e9cd70d384a4b79db2f1666a8d7f79e8e50bfd06e386b22e88f96367966683f7da0a128007bd828120893e1326b7305c7678e10e24bb201e07e78fa7
-
SSDEEP
12288:87AVwypN9NnwDLaDHZoFBHq3Ad4Dqo3XWRsauaaqCuJ586f:EkX9JwDLaDHZoFs3ACcRQaafn6f
Behavioral task
behavioral1
Sample
2024-07-25_96fc916421245c96a28cc6e899fea82a_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-25_96fc916421245c96a28cc6e899fea82a_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
raccoon
6f32a51d9c7fe5326f1e05806bd56f1731747b70
-
url4cnc
https://t.me/leonard0sp
Targets
-
-
Target
2024-07-25_96fc916421245c96a28cc6e899fea82a_avoslocker_cobalt-strike_raccoonstealer_wapomi
-
Size
593KB
-
MD5
96fc916421245c96a28cc6e899fea82a
-
SHA1
88cb3af4ef16e0a98048664b063c5b2403b3a40a
-
SHA256
366f0e781208b8d55d0ececca535ed31be636e1609a655ffa9d5fc1b6587395b
-
SHA512
bfc6cb21e9cd70d384a4b79db2f1666a8d7f79e8e50bfd06e386b22e88f96367966683f7da0a128007bd828120893e1326b7305c7678e10e24bb201e07e78fa7
-
SSDEEP
12288:87AVwypN9NnwDLaDHZoFBHq3Ad4Dqo3XWRsauaaqCuJ586f:EkX9JwDLaDHZoFs3ACcRQaafn6f
-
Raccoon Stealer V1 payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-