General
-
Target
7efe9fc7329a78d32cf8c7f98f068566.zip
-
Size
399KB
-
Sample
240831-mn9crazala
-
MD5
3aeb53b03fee4fcbbdbce91585a68f2b
-
SHA1
c5ef9ecbd5e2fd28903ae791754bdf8f11e065ed
-
SHA256
2f756f44c4ca3ae42f1933cb5989bdc189ef89a62895b3cd9dc3c9092cb57fd1
-
SHA512
f1c74f931eabe479d7131717efdbc639d8676cb0715ddf11728b4783d5fde179cc796c508cdc2a679b29b1304c89412b74cb51f4a3e7a6b94408d071a011a42d
-
SSDEEP
12288:w/dQSVlReoNQRfpTkjHK7PUDSbc2bzhLk9X:GJl8lpTkjHQPU92XhLk9X
Static task
static1
Behavioral task
behavioral1
Sample
49209c0cd75b58e967570eb5a49e9ab2b1533d166c1009e56c242f8e06143ec9.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
49209c0cd75b58e967570eb5a49e9ab2b1533d166c1009e56c242f8e06143ec9.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
raccoon
f101b8d36e5dba77385a11565177c9403f6a2964
-
url4cnc
http://telegatt.top/mailware
http://telegka.top/mailware
http://telegin.top/mailware
https://t.me/mailware
Targets
-
-
Target
49209c0cd75b58e967570eb5a49e9ab2b1533d166c1009e56c242f8e06143ec9
-
Size
561KB
-
MD5
7efe9fc7329a78d32cf8c7f98f068566
-
SHA1
af6b30e7ca4695453251f7d60b85a515004ee9f5
-
SHA256
49209c0cd75b58e967570eb5a49e9ab2b1533d166c1009e56c242f8e06143ec9
-
SHA512
0002322f51e4673001f2f619191818a1d8766b7a0808237bde07c3b8fbbe5cf945e648a65cc7f7363f8a93417edadd1d05abe2aa29963bda93e2ebe1e3cd3315
-
SSDEEP
12288:BcW1HJ+I3MF7H2Jl7XOwIVN5j3vPJxXLT2CQoLm2v0vQGmDc:5JpJlAN93vPjn24mhvP
-
Raccoon Stealer V1 payload
-