General
-
Target
1a5850a2cf94a0109c57c2a11af906fb.exe
-
Size
478KB
-
Sample
200705-zpegv11vtx
-
MD5
1a5850a2cf94a0109c57c2a11af906fb
-
SHA1
e3b88d2372fd99402be0b744e6954d48f2537a88
-
SHA256
f07125e23b0a053b29a6751e938e44e53402f70f67e1af71c7009fcac84d2a2e
-
SHA512
b945399a75393300f04243b4df21bc00351291e27daa5e1f7ef326e9167e45a91aae9b1802d9688317eb054cbc05d106e6afcd919e562342435950a9e0d605d8
Static task
static1
Behavioral task
behavioral1
Sample
1a5850a2cf94a0109c57c2a11af906fb.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
1a5850a2cf94a0109c57c2a11af906fb.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
1a5850a2cf94a0109c57c2a11af906fb.exe
-
Size
478KB
-
MD5
1a5850a2cf94a0109c57c2a11af906fb
-
SHA1
e3b88d2372fd99402be0b744e6954d48f2537a88
-
SHA256
f07125e23b0a053b29a6751e938e44e53402f70f67e1af71c7009fcac84d2a2e
-
SHA512
b945399a75393300f04243b4df21bc00351291e27daa5e1f7ef326e9167e45a91aae9b1802d9688317eb054cbc05d106e6afcd919e562342435950a9e0d605d8
Score10/10-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-