General
-
Target
78bf6cd52082bf0297cea4086c0272cbd13aaaf869d6ec6f2434fdad1eec1072
-
Size
477KB
-
Sample
210807-p9hhtwe8r2
-
MD5
424c927f8731171668db53d1799b2de2
-
SHA1
f974d8e94d87afa0de1156990528775d1174489b
-
SHA256
78bf6cd52082bf0297cea4086c0272cbd13aaaf869d6ec6f2434fdad1eec1072
-
SHA512
239e5be43cf4591f7940c2c716db140d4493d8431ba28fb940b51f63d12c92af063e73ad2183ae692473b3ff77984e8b5ef299f2ce2a30b954b8007979d49aea
Static task
static1
Malware Config
Extracted
raccoon
83fbe81dd43f775dd8af3cd619f88f428fbd9a96
-
url4cnc
https://telete.in/opa4kiprivatem
Targets
-
-
Target
78bf6cd52082bf0297cea4086c0272cbd13aaaf869d6ec6f2434fdad1eec1072
-
Size
477KB
-
MD5
424c927f8731171668db53d1799b2de2
-
SHA1
f974d8e94d87afa0de1156990528775d1174489b
-
SHA256
78bf6cd52082bf0297cea4086c0272cbd13aaaf869d6ec6f2434fdad1eec1072
-
SHA512
239e5be43cf4591f7940c2c716db140d4493d8431ba28fb940b51f63d12c92af063e73ad2183ae692473b3ff77984e8b5ef299f2ce2a30b954b8007979d49aea
-
Detected phishing page
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-