General
-
Target
68de2dcd390425a652d2caee2ed399d9.exe
-
Size
667KB
-
Sample
200630-a9z2bsm4fa
-
MD5
68de2dcd390425a652d2caee2ed399d9
-
SHA1
59477060d8ba5f6efe790a547e7d7781cdedb2cc
-
SHA256
7b19881e169116c36a30db707e9cd7748e0fdb91cb37572689e75c469dc54b52
-
SHA512
8c427cb8aa930b5b5504f6ce5130a34864887595e6528c1e1e57496da0813c7a0777410351bfed8aaf415cbba21a693a7b23a8a4a125262f21caeb8db5a4bfdc
Static task
static1
Behavioral task
behavioral1
Sample
68de2dcd390425a652d2caee2ed399d9.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
68de2dcd390425a652d2caee2ed399d9.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
68de2dcd390425a652d2caee2ed399d9.exe
-
Size
667KB
-
MD5
68de2dcd390425a652d2caee2ed399d9
-
SHA1
59477060d8ba5f6efe790a547e7d7781cdedb2cc
-
SHA256
7b19881e169116c36a30db707e9cd7748e0fdb91cb37572689e75c469dc54b52
-
SHA512
8c427cb8aa930b5b5504f6ce5130a34864887595e6528c1e1e57496da0813c7a0777410351bfed8aaf415cbba21a693a7b23a8a4a125262f21caeb8db5a4bfdc
Score10/10-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-