General
-
Target
host.bin
-
Size
496KB
-
Sample
200415-s6pv8l1h16
-
MD5
e4f4e051625054d753730fd9183c4a34
-
SHA1
d538ffffd82540752a23d5defc90e501093861bf
-
SHA256
43eb644d0682f9bc85745c538015ba9ad19b10116792b5e5aa5da33b6c3af797
-
SHA512
10178975c49c2fc1c414ad1d106d1e46c0fa4bd1748bba24c80b7ff982da034019d69bba3b559255632a8df953dab7ec901b979d8be99ee88efefb3cbd9861a5
Static task
static1
Behavioral task
behavioral1
Sample
host.bin.exe
Resource
win7v200410
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
raccoon
ff236091d9fbac249beeec4137efd72b5327efd9
http://35.240.36.208/gate/log.php
-
url4cnc
https://drive.google.com/uc?export=download&id=12JPrOMXQIwvLmvbb60igt1JLe1WETE6M
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
host.bin
-
Size
496KB
-
MD5
e4f4e051625054d753730fd9183c4a34
-
SHA1
d538ffffd82540752a23d5defc90e501093861bf
-
SHA256
43eb644d0682f9bc85745c538015ba9ad19b10116792b5e5aa5da33b6c3af797
-
SHA512
10178975c49c2fc1c414ad1d106d1e46c0fa4bd1748bba24c80b7ff982da034019d69bba3b559255632a8df953dab7ec901b979d8be99ee88efefb3cbd9861a5
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-