General
-
Target
107ccb41ad91b512e8333807cd8db9ac.exe
-
Size
486KB
-
Sample
200706-l87vy53h8n
-
MD5
107ccb41ad91b512e8333807cd8db9ac
-
SHA1
723e608d985b3080548f471dcdac050926fc8d35
-
SHA256
a721fc0d9ef18fe4ee9b4a42134292cd0c588cacb3d2d28ef9fdb585eb4cd774
-
SHA512
22b933fd51d4a8cf6b9a599922e65bb3650a486ed959ab293ee8bb9a7229cab54f33ae0b8675dce2c02f25cf58160093792cf9b2290af046eef28f19be1951cc
Static task
static1
Behavioral task
behavioral1
Sample
107ccb41ad91b512e8333807cd8db9ac.exe
Resource
win7
Behavioral task
behavioral2
Sample
107ccb41ad91b512e8333807cd8db9ac.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
107ccb41ad91b512e8333807cd8db9ac.exe
-
Size
486KB
-
MD5
107ccb41ad91b512e8333807cd8db9ac
-
SHA1
723e608d985b3080548f471dcdac050926fc8d35
-
SHA256
a721fc0d9ef18fe4ee9b4a42134292cd0c588cacb3d2d28ef9fdb585eb4cd774
-
SHA512
22b933fd51d4a8cf6b9a599922e65bb3650a486ed959ab293ee8bb9a7229cab54f33ae0b8675dce2c02f25cf58160093792cf9b2290af046eef28f19be1951cc
-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-