General
-
Target
15cf5514c69448507e925c96b91537aa.exe
-
Size
1.3MB
-
Sample
200805-qc68lwjdqn
-
MD5
15cf5514c69448507e925c96b91537aa
-
SHA1
81f76655a7a1ad8c326e7453e2b82886bf28b438
-
SHA256
d18f0401809afaaa56922a0cbdc17244288ae4c4956c0818e47343d490338ba1
-
SHA512
c0dae5b17b4b424f0b24614bfef954a51a55c974d52df03dc3dd999b0994f7f1d6215d08c5a7daad696c79f51cc515fd4a8e1fb14eb2b1082bcb5928c454dc88
Static task
static1
Behavioral task
behavioral1
Sample
15cf5514c69448507e925c96b91537aa.exe
Resource
win7
Behavioral task
behavioral2
Sample
15cf5514c69448507e925c96b91537aa.exe
Resource
win10v200722
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
15cf5514c69448507e925c96b91537aa.exe
-
Size
1.3MB
-
MD5
15cf5514c69448507e925c96b91537aa
-
SHA1
81f76655a7a1ad8c326e7453e2b82886bf28b438
-
SHA256
d18f0401809afaaa56922a0cbdc17244288ae4c4956c0818e47343d490338ba1
-
SHA512
c0dae5b17b4b424f0b24614bfef954a51a55c974d52df03dc3dd999b0994f7f1d6215d08c5a7daad696c79f51cc515fd4a8e1fb14eb2b1082bcb5928c454dc88
Score10/10-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-