General
-
Target
43db75c23c7f1f540b9d8d3bbc360ead.exe
-
Size
1.2MB
-
Sample
200724-9cjv6jytjj
-
MD5
43db75c23c7f1f540b9d8d3bbc360ead
-
SHA1
c302437b5abd4a4eeb1a7d351eb9dd8da7ff9dae
-
SHA256
8a670867657f568a3f57b834f9c664493dc3ff38e1da736a06b2b5c7004f47a7
-
SHA512
eb4fe96987ae5f9d1fbb707d0f1f0c757154dd29d506b4934da817589068195a699c78a1f4c0561c4059cb9e1a3100b020f7b528a84787e7ab6ab91f72caedcb
Static task
static1
Behavioral task
behavioral1
Sample
43db75c23c7f1f540b9d8d3bbc360ead.exe
Resource
win7
Behavioral task
behavioral2
Sample
43db75c23c7f1f540b9d8d3bbc360ead.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
43db75c23c7f1f540b9d8d3bbc360ead.exe
-
Size
1.2MB
-
MD5
43db75c23c7f1f540b9d8d3bbc360ead
-
SHA1
c302437b5abd4a4eeb1a7d351eb9dd8da7ff9dae
-
SHA256
8a670867657f568a3f57b834f9c664493dc3ff38e1da736a06b2b5c7004f47a7
-
SHA512
eb4fe96987ae5f9d1fbb707d0f1f0c757154dd29d506b4934da817589068195a699c78a1f4c0561c4059cb9e1a3100b020f7b528a84787e7ab6ab91f72caedcb
Score10/10-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-