General
-
Target
e6df40f5090cb4a09983a15eb047c474.exe
-
Size
452KB
-
Sample
200630-nfhwtz3n36
-
MD5
e6df40f5090cb4a09983a15eb047c474
-
SHA1
0dc8b917bb7134fe85cde6c40154ac8f6a2d2ba5
-
SHA256
6a24e9b0bb291a57dd790134d41758e4e4862e01a05508354a7f134ae6169107
-
SHA512
276197d33e1ac68c9db8199cb8f1eed8bd54c04f19e3111b51705de05a3932502eb18f6dc486de77c21a8c13490566c8216e8d0a618dcfb0e159a92f9713ea77
Static task
static1
Behavioral task
behavioral1
Sample
e6df40f5090cb4a09983a15eb047c474.exe
Resource
win7
Behavioral task
behavioral2
Sample
e6df40f5090cb4a09983a15eb047c474.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
e6df40f5090cb4a09983a15eb047c474.exe
-
Size
452KB
-
MD5
e6df40f5090cb4a09983a15eb047c474
-
SHA1
0dc8b917bb7134fe85cde6c40154ac8f6a2d2ba5
-
SHA256
6a24e9b0bb291a57dd790134d41758e4e4862e01a05508354a7f134ae6169107
-
SHA512
276197d33e1ac68c9db8199cb8f1eed8bd54c04f19e3111b51705de05a3932502eb18f6dc486de77c21a8c13490566c8216e8d0a618dcfb0e159a92f9713ea77
-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-