General
-
Target
7312b30703bdcf66dec5449a7f8f620701c55825fb1ea2f5485505cc8bfb89a5
-
Size
477KB
-
Sample
210807-n46hga5jna
-
MD5
61bfdfcc025b6596bd92253fb0d3d59e
-
SHA1
f22b67433dfd19a2c68f67ae70c1a0cc85041f55
-
SHA256
7312b30703bdcf66dec5449a7f8f620701c55825fb1ea2f5485505cc8bfb89a5
-
SHA512
1cab7c2761c0a155435f7e06c438885edaad7a8821cddcb00a106fcc8f3ba07224eb2405152d7004b52860e4250fedbba6ad265cd7a502aac44df457bfdedf56
Static task
static1
Malware Config
Extracted
raccoon
83fbe81dd43f775dd8af3cd619f88f428fbd9a96
-
url4cnc
https://telete.in/opa4kiprivatem
Targets
-
-
Target
7312b30703bdcf66dec5449a7f8f620701c55825fb1ea2f5485505cc8bfb89a5
-
Size
477KB
-
MD5
61bfdfcc025b6596bd92253fb0d3d59e
-
SHA1
f22b67433dfd19a2c68f67ae70c1a0cc85041f55
-
SHA256
7312b30703bdcf66dec5449a7f8f620701c55825fb1ea2f5485505cc8bfb89a5
-
SHA512
1cab7c2761c0a155435f7e06c438885edaad7a8821cddcb00a106fcc8f3ba07224eb2405152d7004b52860e4250fedbba6ad265cd7a502aac44df457bfdedf56
-
Detected phishing page
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-