General
-
Target
474d396eed0b636f418401036749b8c1.exe
-
Size
1.2MB
-
Sample
200725-egvfpswewx
-
MD5
474d396eed0b636f418401036749b8c1
-
SHA1
756e0012946b02e50bc184947ee35e7d0cdd460f
-
SHA256
89f500dbe860086de0c24dee8e0007194813bf98860de6d5cb32d17b528c8c2f
-
SHA512
9b4af0a8575b05f2ae12147b8f7bd545e17bf5ac471fd93fdafe01ec661b042035768563e3f2b9580369bc8737d3004a807ae2121e09a2ce9714058d26f3d16a
Static task
static1
Behavioral task
behavioral1
Sample
474d396eed0b636f418401036749b8c1.exe
Resource
win7
Behavioral task
behavioral2
Sample
474d396eed0b636f418401036749b8c1.exe
Resource
win10v200722
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
474d396eed0b636f418401036749b8c1.exe
-
Size
1.2MB
-
MD5
474d396eed0b636f418401036749b8c1
-
SHA1
756e0012946b02e50bc184947ee35e7d0cdd460f
-
SHA256
89f500dbe860086de0c24dee8e0007194813bf98860de6d5cb32d17b528c8c2f
-
SHA512
9b4af0a8575b05f2ae12147b8f7bd545e17bf5ac471fd93fdafe01ec661b042035768563e3f2b9580369bc8737d3004a807ae2121e09a2ce9714058d26f3d16a
Score10/10-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-