General
-
Target
F280C0E47B233BF506DCA76AA052C9F4.exe
-
Size
495KB
-
Sample
210804-pzkb51ybk2
-
MD5
f280c0e47b233bf506dca76aa052c9f4
-
SHA1
f3db1bf1d2c6fbfca8652264bb20b14e287eec26
-
SHA256
18d0024251d5fab936f344a0d05785f40d3f18f2ea78fb8139f941b0d36a1f7b
-
SHA512
648492a73b9c9206bb6a00b827cc740377175adae25faa3a21a2338c73f1ff8741c9fa556a3c913eb0bb2e459c147c98b2d25322b5d4da2e2b7931895b9c2f1f
Static task
static1
Behavioral task
behavioral1
Sample
F280C0E47B233BF506DCA76AA052C9F4.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
F280C0E47B233BF506DCA76AA052C9F4.exe
Resource
win10v20210410
Malware Config
Extracted
raccoon
8698be2e7e5a4e7e4dc8cd71c3845a10c60398c6
-
url4cnc
https://telete.in/youyouhell0world
Targets
-
-
Target
F280C0E47B233BF506DCA76AA052C9F4.exe
-
Size
495KB
-
MD5
f280c0e47b233bf506dca76aa052c9f4
-
SHA1
f3db1bf1d2c6fbfca8652264bb20b14e287eec26
-
SHA256
18d0024251d5fab936f344a0d05785f40d3f18f2ea78fb8139f941b0d36a1f7b
-
SHA512
648492a73b9c9206bb6a00b827cc740377175adae25faa3a21a2338c73f1ff8741c9fa556a3c913eb0bb2e459c147c98b2d25322b5d4da2e2b7931895b9c2f1f
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-