General
-
Target
763681c09846b8efd353c1f21f32beb3b1a4b66cb1652fe8f8a54dfee7ad19f9
-
Size
478KB
-
Sample
210807-cxn183rghe
-
MD5
7b7ea06bc32f1dca48a51229d69cb683
-
SHA1
6e4651d41591aa8aad5e57ac13baf0fe0e2e604e
-
SHA256
763681c09846b8efd353c1f21f32beb3b1a4b66cb1652fe8f8a54dfee7ad19f9
-
SHA512
65889030ec130dc54d56aaefa40b53dcfe53635293a74a92bdcbe49e942fea7bdb5febba23662d844dfa0e7e85664af96e63437aa4a045e3ea303062d1d92e06
Static task
static1
Malware Config
Extracted
raccoon
83fbe81dd43f775dd8af3cd619f88f428fbd9a96
-
url4cnc
https://telete.in/opa4kiprivatem
Targets
-
-
Target
763681c09846b8efd353c1f21f32beb3b1a4b66cb1652fe8f8a54dfee7ad19f9
-
Size
478KB
-
MD5
7b7ea06bc32f1dca48a51229d69cb683
-
SHA1
6e4651d41591aa8aad5e57ac13baf0fe0e2e604e
-
SHA256
763681c09846b8efd353c1f21f32beb3b1a4b66cb1652fe8f8a54dfee7ad19f9
-
SHA512
65889030ec130dc54d56aaefa40b53dcfe53635293a74a92bdcbe49e942fea7bdb5febba23662d844dfa0e7e85664af96e63437aa4a045e3ea303062d1d92e06
-
Detected phishing page
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-