General
-
Target
c8c24ff2a9c6e86940db78b301b55a95.exe
-
Size
479KB
-
Sample
200705-1ttnntnkw6
-
MD5
c8c24ff2a9c6e86940db78b301b55a95
-
SHA1
2c283ed8f1478cb6c185ddf5a84384e696315e51
-
SHA256
7106b6bf52fc18ae345b4621a5be82f6a4edef9b418ca3a04768c1d4c8b9f599
-
SHA512
315de9d40300bc5869b7f8c7b5345851e9f174d6efddc3a8be5d36892b1c7153610b5509c0914cb1db6ec4929d9250cf79941e04a9ba7cdb943b775585e8894a
Static task
static1
Behavioral task
behavioral1
Sample
c8c24ff2a9c6e86940db78b301b55a95.exe
Resource
win7
Behavioral task
behavioral2
Sample
c8c24ff2a9c6e86940db78b301b55a95.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
c8c24ff2a9c6e86940db78b301b55a95.exe
-
Size
479KB
-
MD5
c8c24ff2a9c6e86940db78b301b55a95
-
SHA1
2c283ed8f1478cb6c185ddf5a84384e696315e51
-
SHA256
7106b6bf52fc18ae345b4621a5be82f6a4edef9b418ca3a04768c1d4c8b9f599
-
SHA512
315de9d40300bc5869b7f8c7b5345851e9f174d6efddc3a8be5d36892b1c7153610b5509c0914cb1db6ec4929d9250cf79941e04a9ba7cdb943b775585e8894a
-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-