General
-
Target
86e04431cccbd15fd2f8af7a4e4c027ea3dcb7b4a1dbf6a67c7e7e10662b626c
-
Size
476KB
-
Sample
210807-rlgfst264x
-
MD5
e42b8cbce323acfe5bc0ad0207a2e17e
-
SHA1
ce34349b430fddd381ddfc450b2c3fdc6f820010
-
SHA256
86e04431cccbd15fd2f8af7a4e4c027ea3dcb7b4a1dbf6a67c7e7e10662b626c
-
SHA512
7b72ade3f65022813b090aae73c96af53e5336361462a38b9ff2e834789b405bca0b055d2b930fec01905d8008e14462b6eb4224fa845dce82d107363f83244e
Static task
static1
Malware Config
Extracted
raccoon
83fbe81dd43f775dd8af3cd619f88f428fbd9a96
-
url4cnc
https://telete.in/opa4kiprivatem
Targets
-
-
Target
86e04431cccbd15fd2f8af7a4e4c027ea3dcb7b4a1dbf6a67c7e7e10662b626c
-
Size
476KB
-
MD5
e42b8cbce323acfe5bc0ad0207a2e17e
-
SHA1
ce34349b430fddd381ddfc450b2c3fdc6f820010
-
SHA256
86e04431cccbd15fd2f8af7a4e4c027ea3dcb7b4a1dbf6a67c7e7e10662b626c
-
SHA512
7b72ade3f65022813b090aae73c96af53e5336361462a38b9ff2e834789b405bca0b055d2b930fec01905d8008e14462b6eb4224fa845dce82d107363f83244e
-
Detected phishing page
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-