General
-
Target
2024-07-26_97834990b4e54a935612e5e8b39fca0b_avoslocker_cobalt-strike_raccoonstealer_wapomi
-
Size
589KB
-
Sample
240726-m2ds1atdqn
-
MD5
97834990b4e54a935612e5e8b39fca0b
-
SHA1
e663ada1cd97047fb9e6dc55af7950e84ab72717
-
SHA256
cdfe4848ff55e19e93b18046cfa40283bc3b6927a6e3bb9274c2aedc554c1d65
-
SHA512
187bb343d0581123046149fce3a6477fef64d86e480708d8a8238f5ea3ac36e0cc388f70c4f90c59e02276626bbd2cd8ffd94e5678d60295b33e079635386e48
-
SSDEEP
12288:05ntsDk51T1v2AqWsmCsWZC6cm3mS5Osw4KT5uImXzsMji8WhoQm6f:Ontso1T1v2AVZXWZZqRqUuI
Behavioral task
behavioral1
Sample
2024-07-26_97834990b4e54a935612e5e8b39fca0b_avoslocker_cobalt-strike_raccoonstealer_wapomi.exe
Resource
win7-20240708-en
Malware Config
Extracted
gozi
Extracted
raccoon
1.7.3
c021300d0074689fde86c87568e215c582272721
-
url4cnc
https://tttttt.me/ch0koalpengold
Targets
-
-
Target
2024-07-26_97834990b4e54a935612e5e8b39fca0b_avoslocker_cobalt-strike_raccoonstealer_wapomi
-
Size
589KB
-
MD5
97834990b4e54a935612e5e8b39fca0b
-
SHA1
e663ada1cd97047fb9e6dc55af7950e84ab72717
-
SHA256
cdfe4848ff55e19e93b18046cfa40283bc3b6927a6e3bb9274c2aedc554c1d65
-
SHA512
187bb343d0581123046149fce3a6477fef64d86e480708d8a8238f5ea3ac36e0cc388f70c4f90c59e02276626bbd2cd8ffd94e5678d60295b33e079635386e48
-
SSDEEP
12288:05ntsDk51T1v2AqWsmCsWZC6cm3mS5Osw4KT5uImXzsMji8WhoQm6f:Ontso1T1v2AVZXWZZqRqUuI
-
Raccoon Stealer V1 payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-