General
-
Target
2c1890262e892afbd93b2520c440f2f97822740a0c6e92fb56ae69ceab95fac3
-
Size
477KB
-
Sample
210807-fqq7nph5tn
-
MD5
39138d614230e26d5dc7e7999e094d1b
-
SHA1
094b1fad03a8d37130660250c29e1b3a88281cbd
-
SHA256
2c1890262e892afbd93b2520c440f2f97822740a0c6e92fb56ae69ceab95fac3
-
SHA512
87167fb9d394a1638386f5fc3b062aa948bd47fcf9bd192b9ee321af6a745ed9ccb38f36b747b486ad6dad2d445a5b574642a5a7cd4006aaa13ac3bb7dba1a26
Static task
static1
Malware Config
Extracted
raccoon
83fbe81dd43f775dd8af3cd619f88f428fbd9a96
-
url4cnc
https://telete.in/opa4kiprivatem
Targets
-
-
Target
2c1890262e892afbd93b2520c440f2f97822740a0c6e92fb56ae69ceab95fac3
-
Size
477KB
-
MD5
39138d614230e26d5dc7e7999e094d1b
-
SHA1
094b1fad03a8d37130660250c29e1b3a88281cbd
-
SHA256
2c1890262e892afbd93b2520c440f2f97822740a0c6e92fb56ae69ceab95fac3
-
SHA512
87167fb9d394a1638386f5fc3b062aa948bd47fcf9bd192b9ee321af6a745ed9ccb38f36b747b486ad6dad2d445a5b574642a5a7cd4006aaa13ac3bb7dba1a26
-
Detected phishing page
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-