General
-
Target
3e138230bd00c8d0878ffa7b5dc5e8827aa65f8f5a3d96450f0bd048d771b4a0.exe
-
Size
476KB
-
Sample
240726-dbkdesvdrf
-
MD5
cc715e675cf509c25aaa918dfe92d8c7
-
SHA1
bdb9b6697f1af20b237cdebee07719ff611cd56c
-
SHA256
3e138230bd00c8d0878ffa7b5dc5e8827aa65f8f5a3d96450f0bd048d771b4a0
-
SHA512
5fe276ecd2ab44569684b6890439f751171a23905d50683e9cdb959d6d5e2c55b976484386caf258b662414c31c1fa54aa21cf43a5d29e106efcbd6053bf8441
-
SSDEEP
12288:YVEJtDELG2OyT3/foiVTE7gjiQugC9yFsNJwoO:YVAELGiIibjugLoh
Static task
static1
Behavioral task
behavioral1
Sample
3e138230bd00c8d0878ffa7b5dc5e8827aa65f8f5a3d96450f0bd048d771b4a0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e138230bd00c8d0878ffa7b5dc5e8827aa65f8f5a3d96450f0bd048d771b4a0.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
raccoon
1.7.3
cd8dc1031358b1aec55cc6bc447df1018b068607
-
url4cnc
https://telete.in/jagressor_kz
Targets
-
-
Target
3e138230bd00c8d0878ffa7b5dc5e8827aa65f8f5a3d96450f0bd048d771b4a0.exe
-
Size
476KB
-
MD5
cc715e675cf509c25aaa918dfe92d8c7
-
SHA1
bdb9b6697f1af20b237cdebee07719ff611cd56c
-
SHA256
3e138230bd00c8d0878ffa7b5dc5e8827aa65f8f5a3d96450f0bd048d771b4a0
-
SHA512
5fe276ecd2ab44569684b6890439f751171a23905d50683e9cdb959d6d5e2c55b976484386caf258b662414c31c1fa54aa21cf43a5d29e106efcbd6053bf8441
-
SSDEEP
12288:YVEJtDELG2OyT3/foiVTE7gjiQugC9yFsNJwoO:YVAELGiIibjugLoh
-
Raccoon Stealer V1 payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-