General
-
Target
966b20a7237a77a80f7a9192315f7702.exe
-
Size
512KB
-
Sample
200625-ntr1ep7qg2
-
MD5
966b20a7237a77a80f7a9192315f7702
-
SHA1
f3aa6f976f620fd8be15a53612638b5e66e27b35
-
SHA256
356c60f9b2cfb563dc067db5971545eb5a414ab55bba68812adce17d7fe6d938
-
SHA512
d4bb740578c448771ea085127f6713c78537876f6fb5855cd11334a00ae1c3b59fc974f99b3b5a3d31cfe1750ff6737646ffcd6853a6be05eb7879f1a4750ef7
Static task
static1
Behavioral task
behavioral1
Sample
966b20a7237a77a80f7a9192315f7702.exe
Resource
win7
Behavioral task
behavioral2
Sample
966b20a7237a77a80f7a9192315f7702.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
966b20a7237a77a80f7a9192315f7702.exe
-
Size
512KB
-
MD5
966b20a7237a77a80f7a9192315f7702
-
SHA1
f3aa6f976f620fd8be15a53612638b5e66e27b35
-
SHA256
356c60f9b2cfb563dc067db5971545eb5a414ab55bba68812adce17d7fe6d938
-
SHA512
d4bb740578c448771ea085127f6713c78537876f6fb5855cd11334a00ae1c3b59fc974f99b3b5a3d31cfe1750ff6737646ffcd6853a6be05eb7879f1a4750ef7
-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-