General
-
Target
6772bdf4c43f4c082f8af91ce7f49ff8.exe
-
Size
477KB
-
Sample
200705-72alppfxss
-
MD5
6772bdf4c43f4c082f8af91ce7f49ff8
-
SHA1
9f58dd35dcf7638f3d78678566c08138903233a1
-
SHA256
93dee081adc816e9913b0317828d67cfff982c94506f803fe85eaa73b116283f
-
SHA512
0183844cad6cfaafe9ebcca264c898ee598602ae625c6ce70070efa782054747e024607386926795cb816a6341e4afdb4585b4230efb305d874fc2dde7fe3b9b
Static task
static1
Behavioral task
behavioral1
Sample
6772bdf4c43f4c082f8af91ce7f49ff8.exe
Resource
win7
Behavioral task
behavioral2
Sample
6772bdf4c43f4c082f8af91ce7f49ff8.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
6772bdf4c43f4c082f8af91ce7f49ff8.exe
-
Size
477KB
-
MD5
6772bdf4c43f4c082f8af91ce7f49ff8
-
SHA1
9f58dd35dcf7638f3d78678566c08138903233a1
-
SHA256
93dee081adc816e9913b0317828d67cfff982c94506f803fe85eaa73b116283f
-
SHA512
0183844cad6cfaafe9ebcca264c898ee598602ae625c6ce70070efa782054747e024607386926795cb816a6341e4afdb4585b4230efb305d874fc2dde7fe3b9b
-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-