General
-
Target
64ce610dfe0cca7b01209dd6f3ffde0b.exe
-
Size
1.2MB
-
Sample
200724-jama5pvcgn
-
MD5
64ce610dfe0cca7b01209dd6f3ffde0b
-
SHA1
64b3feb07597ef9e189a3bc648a0a87efc1b9ccc
-
SHA256
f29dabfd340204d4b03710cb62064d2048d640b2261281dbacd3db32ac7db81f
-
SHA512
b77aab4f420603ad227217a87da5fc056c8cc61f338576cc01ea895c1340bf86780e1d549922944451e9e1f9df153dc5102d738bc7cb039d9f5a8c7c9b352b96
Static task
static1
Behavioral task
behavioral1
Sample
64ce610dfe0cca7b01209dd6f3ffde0b.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
64ce610dfe0cca7b01209dd6f3ffde0b.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
64ce610dfe0cca7b01209dd6f3ffde0b.exe
-
Size
1.2MB
-
MD5
64ce610dfe0cca7b01209dd6f3ffde0b
-
SHA1
64b3feb07597ef9e189a3bc648a0a87efc1b9ccc
-
SHA256
f29dabfd340204d4b03710cb62064d2048d640b2261281dbacd3db32ac7db81f
-
SHA512
b77aab4f420603ad227217a87da5fc056c8cc61f338576cc01ea895c1340bf86780e1d549922944451e9e1f9df153dc5102d738bc7cb039d9f5a8c7c9b352b96
Score10/10-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-