General
-
Target
3f0d621f5784ae2bb0a398d078b67035c4c64bb7bc518a949229523436e23ce6
-
Size
469KB
-
Sample
250112-2kvgravqbj
-
MD5
40df64e2e56daa1e1f8361d0fa1302d0
-
SHA1
fbf3db6351fa9d40f51ed31e837688228253a348
-
SHA256
3f0d621f5784ae2bb0a398d078b67035c4c64bb7bc518a949229523436e23ce6
-
SHA512
e182b02752a2045aa69ee8ccf08531e4d6f9f6e61219a8971bee8a5f756c2f40fd7bda1e943fb91b5da152b8fe40f491b42d5c72fc2a34ca84fe5432c538ce84
-
SSDEEP
12288:A6jlhP4uVOeWkH7r5lIWqh0cURICpfHLj:ZRV4uV//IWqhE3fH/
Static task
static1
Behavioral task
behavioral1
Sample
3f0d621f5784ae2bb0a398d078b67035c4c64bb7bc518a949229523436e23ce6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f0d621f5784ae2bb0a398d078b67035c4c64bb7bc518a949229523436e23ce6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
raccoon
faea3ab5ea06a40f0cc8f655e526972689ca1b1f
-
url4cnc
https://drive.google.com/uc?export=download&id=1QQXAXArU8BU4kJZ6IBsSCCyLtmLftiOV
Targets
-
-
Target
3f0d621f5784ae2bb0a398d078b67035c4c64bb7bc518a949229523436e23ce6
-
Size
469KB
-
MD5
40df64e2e56daa1e1f8361d0fa1302d0
-
SHA1
fbf3db6351fa9d40f51ed31e837688228253a348
-
SHA256
3f0d621f5784ae2bb0a398d078b67035c4c64bb7bc518a949229523436e23ce6
-
SHA512
e182b02752a2045aa69ee8ccf08531e4d6f9f6e61219a8971bee8a5f756c2f40fd7bda1e943fb91b5da152b8fe40f491b42d5c72fc2a34ca84fe5432c538ce84
-
SSDEEP
12288:A6jlhP4uVOeWkH7r5lIWqh0cURICpfHLj:ZRV4uV//IWqhE3fH/
-
Raccoon Stealer V1 payload
-
Raccoon family
-
Legitimate hosting services abused for malware hosting/C2
-