General
-
Target
fd51d93f73653bd1e840a65bb443588e.exe
-
Size
1.1MB
-
Sample
200731-c6d6cqtc92
-
MD5
fd51d93f73653bd1e840a65bb443588e
-
SHA1
e501078e0e0a64b3687010ca4abccad28c01f7b9
-
SHA256
b5732fcd4ea7d157452c9467cc5beb8f7fbda6e37c74a4ec709f958eff1c8a54
-
SHA512
45606b4f522382fb8fff05c68dae0d26eedc6344cdff8fa4cdf1e96035c45f118c08b21ccfffcd97f962ff8cec5e872f9e4c3924c29dbcacee8ff61f43e3ef4c
Static task
static1
Behavioral task
behavioral1
Sample
fd51d93f73653bd1e840a65bb443588e.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
fd51d93f73653bd1e840a65bb443588e.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
fd51d93f73653bd1e840a65bb443588e.exe
-
Size
1.1MB
-
MD5
fd51d93f73653bd1e840a65bb443588e
-
SHA1
e501078e0e0a64b3687010ca4abccad28c01f7b9
-
SHA256
b5732fcd4ea7d157452c9467cc5beb8f7fbda6e37c74a4ec709f958eff1c8a54
-
SHA512
45606b4f522382fb8fff05c68dae0d26eedc6344cdff8fa4cdf1e96035c45f118c08b21ccfffcd97f962ff8cec5e872f9e4c3924c29dbcacee8ff61f43e3ef4c
Score10/10-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-