General
-
Target
009D0000.bin.zip
-
Size
291KB
-
Sample
200908-kp4caq62nn
-
MD5
d81c7937ec46340e90002a5a01f0246e
-
SHA1
26477e1434448bec3637ed375065775314a7fb47
-
SHA256
5dac30fd19be4243af12dce87e179554b1a548b0ccde14b183f15d68691c2b0d
-
SHA512
0def53536a5077685ac8a92ade095843e313a3eb4ad3feb97dafc68e6e1cffd4baa35673f70fd662b1bd9efaa94aaabd19d7bc594fad93ad80c4268b92938703
Static task
static1
Behavioral task
behavioral1
Sample
009D0000.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
009D0000.bin.exe
Resource
win10v200722
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
009D0000.bin
-
Size
572KB
-
MD5
f3319fdbd273a33c7646aec1670fc860
-
SHA1
1fe714a0b1c249b46d0b9e422298f4911ee5fa61
-
SHA256
9d8e39ac916e2f7cfd0ee02b5321b6168260622b5eea3ca250e476ab52e0cae0
-
SHA512
d191fc3c899c139e8b4d1280c9ee32d2c79f5a0a51e0b843adadbdef446fce76350612f5428fe9e72951d9620152edde5b6f6e6f41c557184461f4359cce82d4
Score10/10-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-