General
-
Target
raccon.exe
-
Size
578KB
-
Sample
200304-efzvqf63j2
-
MD5
c2f1df38f9949f30b527f36071a3c3b7
-
SHA1
e959aa26998f1d9004e910c4bbd55e23c8813079
-
SHA256
fd15c60368128f2b7390594ebd0a0def921c8c4bbeb7410c72d6fc08f8950cfd
-
SHA512
2d0a70ad5a680e148c0dad922a043788ee5f70c44ada452849a167bf11c796239fbde82ee20fdfc4c53ca0c5d64c5a6cae57522239e508eb248ae38a39817079
Static task
static1
Behavioral task
behavioral1
Sample
raccon.exe
Resource
win7v200217
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
raccon.exe
-
Size
578KB
-
MD5
c2f1df38f9949f30b527f36071a3c3b7
-
SHA1
e959aa26998f1d9004e910c4bbd55e23c8813079
-
SHA256
fd15c60368128f2b7390594ebd0a0def921c8c4bbeb7410c72d6fc08f8950cfd
-
SHA512
2d0a70ad5a680e148c0dad922a043788ee5f70c44ada452849a167bf11c796239fbde82ee20fdfc4c53ca0c5d64c5a6cae57522239e508eb248ae38a39817079
-
Loads dropped DLL
-
Program crash
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-