General
-
Target
855b2e51feba4c0ec672e1b335d9a545f3b3335af034dc121307e47794165b0a
-
Size
477KB
-
Sample
210806-tex58mtqe6
-
MD5
3e6fbff814629b3836989e60d6b6344e
-
SHA1
292e9a41c6316bc408701a21a3240f89a525a21e
-
SHA256
855b2e51feba4c0ec672e1b335d9a545f3b3335af034dc121307e47794165b0a
-
SHA512
9e42ad52252803441e57cf458e2d472d1a9478d9742123cc6e22c981cb0f4ad199de361f6fa4f4412f44a297a8524ce87670af1d925c581091f57956edf4b573
Static task
static1
Malware Config
Extracted
raccoon
83fbe81dd43f775dd8af3cd619f88f428fbd9a96
-
url4cnc
https://telete.in/opa4kiprivatem
Targets
-
-
Target
855b2e51feba4c0ec672e1b335d9a545f3b3335af034dc121307e47794165b0a
-
Size
477KB
-
MD5
3e6fbff814629b3836989e60d6b6344e
-
SHA1
292e9a41c6316bc408701a21a3240f89a525a21e
-
SHA256
855b2e51feba4c0ec672e1b335d9a545f3b3335af034dc121307e47794165b0a
-
SHA512
9e42ad52252803441e57cf458e2d472d1a9478d9742123cc6e22c981cb0f4ad199de361f6fa4f4412f44a297a8524ce87670af1d925c581091f57956edf4b573
-
Detected phishing page
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-