General
-
Target
ae5d3bbe200550c80f994334dd748dbf.exe
-
Size
462KB
-
Sample
200630-57l9nlqw6x
-
MD5
ae5d3bbe200550c80f994334dd748dbf
-
SHA1
c92c6c21134a4116edd83684a2e15d1b29a8c9fa
-
SHA256
500657f97a195fbaa311e49c124d98d2e1c39e248cac6f6a794a2d425bb3644f
-
SHA512
ddb85e58e6a25ca3fe4f31ebd8852736f7061222f96052ab574019b3b4bf255ad3fc30159044ee4f73bbb261808486ad6e413b2857d0fb5374c6ee4f325aaf54
Static task
static1
Behavioral task
behavioral1
Sample
ae5d3bbe200550c80f994334dd748dbf.exe
Resource
win7
Behavioral task
behavioral2
Sample
ae5d3bbe200550c80f994334dd748dbf.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
ae5d3bbe200550c80f994334dd748dbf.exe
-
Size
462KB
-
MD5
ae5d3bbe200550c80f994334dd748dbf
-
SHA1
c92c6c21134a4116edd83684a2e15d1b29a8c9fa
-
SHA256
500657f97a195fbaa311e49c124d98d2e1c39e248cac6f6a794a2d425bb3644f
-
SHA512
ddb85e58e6a25ca3fe4f31ebd8852736f7061222f96052ab574019b3b4bf255ad3fc30159044ee4f73bbb261808486ad6e413b2857d0fb5374c6ee4f325aaf54
-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-