General
-
Target
12e0cfc2c3b6e097734ed2b698f30cdcb0a2f3b291535ad5947a72797118934b
-
Size
477KB
-
Sample
210807-shy5d1b2gn
-
MD5
03744949816c1fc94475f5aaea8001be
-
SHA1
1a65cc068327f77f04fe783575afa86adef9835d
-
SHA256
12e0cfc2c3b6e097734ed2b698f30cdcb0a2f3b291535ad5947a72797118934b
-
SHA512
85688ef01d6f26881e2deb36238e0e7de3e4192eedccb1d4a6946b817adcf60d7af4e00fd58bc863335126fb5b454dfe9d97d8f492325d1a9b492511e0bc5a0b
Static task
static1
Malware Config
Extracted
raccoon
83fbe81dd43f775dd8af3cd619f88f428fbd9a96
-
url4cnc
https://telete.in/opa4kiprivatem
Targets
-
-
Target
12e0cfc2c3b6e097734ed2b698f30cdcb0a2f3b291535ad5947a72797118934b
-
Size
477KB
-
MD5
03744949816c1fc94475f5aaea8001be
-
SHA1
1a65cc068327f77f04fe783575afa86adef9835d
-
SHA256
12e0cfc2c3b6e097734ed2b698f30cdcb0a2f3b291535ad5947a72797118934b
-
SHA512
85688ef01d6f26881e2deb36238e0e7de3e4192eedccb1d4a6946b817adcf60d7af4e00fd58bc863335126fb5b454dfe9d97d8f492325d1a9b492511e0bc5a0b
-
Detected phishing page
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-