General
-
Target
eb9d1220e5322bcfe4f35193376f9c41
-
Size
465KB
-
Sample
210804-sfczfl3fbx
-
MD5
eb9d1220e5322bcfe4f35193376f9c41
-
SHA1
ae9155750b3c7501a5c6e1ce4c458fb92d65e372
-
SHA256
3afbed4e5f1478afdf560b832b2342fe53e565c204d724b4158d5b3f1a121bda
-
SHA512
633af484ca3f1e633ce1f2000114d7c08b8a9387bc4fb5e7a08a9ffcc69e115dd3e01ee71fa22c5faa10717021e3edb6988f24cf9aa009b6e9d40b6bcf50e9f9
Static task
static1
Behavioral task
behavioral1
Sample
eb9d1220e5322bcfe4f35193376f9c41.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
eb9d1220e5322bcfe4f35193376f9c41.exe
Resource
win10v20210410
Malware Config
Extracted
raccoon
8698be2e7e5a4e7e4dc8cd71c3845a10c60398c6
-
url4cnc
https://telete.in/youyouhell0world
Targets
-
-
Target
eb9d1220e5322bcfe4f35193376f9c41
-
Size
465KB
-
MD5
eb9d1220e5322bcfe4f35193376f9c41
-
SHA1
ae9155750b3c7501a5c6e1ce4c458fb92d65e372
-
SHA256
3afbed4e5f1478afdf560b832b2342fe53e565c204d724b4158d5b3f1a121bda
-
SHA512
633af484ca3f1e633ce1f2000114d7c08b8a9387bc4fb5e7a08a9ffcc69e115dd3e01ee71fa22c5faa10717021e3edb6988f24cf9aa009b6e9d40b6bcf50e9f9
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-