General
-
Target
e75c5be586038f8bd58e5ea84fca6e64.exe
-
Size
931KB
-
Sample
200806-adwzzbl3h2
-
MD5
e75c5be586038f8bd58e5ea84fca6e64
-
SHA1
4077e8bbeb0e4091007749c28bb2b79a0f9ddd10
-
SHA256
bac29ec9cc313b0095c073bf0c1fa848a7371e5584df65c13289a4a5f3f86728
-
SHA512
44b2ffbb5421b7e56b43d9af55a3ff6ee5c2dd6dd142f11a27fddb9c269ca8dfafc9cf8e68edcd689fdfdee4939e287110bcaf713538a69ebfd527cd22bf71d1
Static task
static1
Behavioral task
behavioral1
Sample
e75c5be586038f8bd58e5ea84fca6e64.exe
Resource
win7
Behavioral task
behavioral2
Sample
e75c5be586038f8bd58e5ea84fca6e64.exe
Resource
win10v200722
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
e75c5be586038f8bd58e5ea84fca6e64.exe
-
Size
931KB
-
MD5
e75c5be586038f8bd58e5ea84fca6e64
-
SHA1
4077e8bbeb0e4091007749c28bb2b79a0f9ddd10
-
SHA256
bac29ec9cc313b0095c073bf0c1fa848a7371e5584df65c13289a4a5f3f86728
-
SHA512
44b2ffbb5421b7e56b43d9af55a3ff6ee5c2dd6dd142f11a27fddb9c269ca8dfafc9cf8e68edcd689fdfdee4939e287110bcaf713538a69ebfd527cd22bf71d1
Score10/10-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-