General
-
Target
SecuriteInfo.com.Generic.mg.7975f3dcbfe930fb.26838
-
Size
662KB
-
Sample
200629-jxgx9q4rks
-
MD5
7975f3dcbfe930fb56c0e573a5eb7837
-
SHA1
1ef976f7291f3349872dc297859812c4cd9ad253
-
SHA256
7b92a65a87f3dd16866e092d7979717a9feb5de74d3349aba918dd0e88850269
-
SHA512
6c6926d753bffc81ef48f9ed02b77a0bc31b7c00ef0c69b8fa419947fdcdb161e2df3e7a1f26edb7b2a44c9c75985f21cd88f9a15c59fb3e2332d1302191757c
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Generic.mg.7975f3dcbfe930fb.26838.exe
Resource
win7
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Generic.mg.7975f3dcbfe930fb.26838.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
SecuriteInfo.com.Generic.mg.7975f3dcbfe930fb.26838
-
Size
662KB
-
MD5
7975f3dcbfe930fb56c0e573a5eb7837
-
SHA1
1ef976f7291f3349872dc297859812c4cd9ad253
-
SHA256
7b92a65a87f3dd16866e092d7979717a9feb5de74d3349aba918dd0e88850269
-
SHA512
6c6926d753bffc81ef48f9ed02b77a0bc31b7c00ef0c69b8fa419947fdcdb161e2df3e7a1f26edb7b2a44c9c75985f21cd88f9a15c59fb3e2332d1302191757c
-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-