General
-
Target
f09199826117a1093997eb8a49cbb8864e7d8c09b51fcd00f43990ab95404cb1
-
Size
5.7MB
-
Sample
250319-w3p24azwey
-
MD5
7135fb61caec80a8da3c47b957417d73
-
SHA1
17482a3398c6568436958acae34eeb58853df4c5
-
SHA256
f09199826117a1093997eb8a49cbb8864e7d8c09b51fcd00f43990ab95404cb1
-
SHA512
56a32af6ff2b78f6e359bcb1cbdbfdbf2bc850cf8262128c78c394f2bf84d97b66267aebd240223f33e97056cddb7affc39893e5b3fa175e5ad6ffaf99510f32
-
SSDEEP
98304:lqCaTEEwrCjWIqTTdaHcbPf6FjV1GiaLME3hTm84zDRqSR8w6S:lqCNESQWrHdaHdj+iaLTA8ovj
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
raccoon
d4074b8c479181b90e810443a9405f3c
http://37.220.87.44/
http://94.131.3.70/
http://83.217.11.11/
http://83.217.11.13/
http://83.217.11.14/
-
user_agent
901785252112
Targets
-
-
Target
Setup.exe
-
Size
452.2MB
-
MD5
c3b25a6bf3a32b7bd60b9576dbac3b37
-
SHA1
aae8ee759d2863471d129298a7a9e44438c9c7c9
-
SHA256
9d0f96a453ab3e3dce72b0d2408f8058d45bffe31da5370f3e4183667f0dc81c
-
SHA512
73b0f9c3c55254736bd2563c9ffd37be25cbdd1938c4cfa7c90cba9b75686449113597f8ba2c36fe07cc06b18a61fceb6148c660879be42a1921fb11477ec7f9
-
SSDEEP
49152:NAATgSv2pXsDtvpny01CY62z8Q7jzZ6CWwlmjXtW7c5Qi+nSaIy:NAAcSisBvpVLoQ7R8XtWLHIy
-
Raccoon Stealer V2 payload
-
Raccoon family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-