General
-
Target
eba8484991df54d1d442b5dfbcd60f26.exe
-
Size
1.2MB
-
Sample
200725-lhk8dbqcte
-
MD5
eba8484991df54d1d442b5dfbcd60f26
-
SHA1
f3d5bf0395ab8565bffc219813a4cad681bd3d21
-
SHA256
23d54479375d0aca8bf45a1d3a23ea344fa8fe60af98a497dd87268f354b9daa
-
SHA512
feeb1580d3df8478f6113d92d6e51c8b2353f9d362fdfc53c5a989467726f99cf91f84b416165b3476021d3b1a96d9c7fd727c2ccac5a63926863f37a40b8f7c
Static task
static1
Behavioral task
behavioral1
Sample
eba8484991df54d1d442b5dfbcd60f26.exe
Resource
win7
Behavioral task
behavioral2
Sample
eba8484991df54d1d442b5dfbcd60f26.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
eba8484991df54d1d442b5dfbcd60f26.exe
-
Size
1.2MB
-
MD5
eba8484991df54d1d442b5dfbcd60f26
-
SHA1
f3d5bf0395ab8565bffc219813a4cad681bd3d21
-
SHA256
23d54479375d0aca8bf45a1d3a23ea344fa8fe60af98a497dd87268f354b9daa
-
SHA512
feeb1580d3df8478f6113d92d6e51c8b2353f9d362fdfc53c5a989467726f99cf91f84b416165b3476021d3b1a96d9c7fd727c2ccac5a63926863f37a40b8f7c
Score10/10-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-