General
-
Target
e419e562494f227789f2d9a45f4ba969cbc8d04820c0d891d3b9d65112c3ae02
-
Size
496KB
-
Sample
210807-v6w3erf41x
-
MD5
4980339158699a120a6daaa26f89d1db
-
SHA1
4fbfc1ec600a690c69199549cdfa457ad3948bbd
-
SHA256
e419e562494f227789f2d9a45f4ba969cbc8d04820c0d891d3b9d65112c3ae02
-
SHA512
b99e59bd5b460d565e1eb27c20fad26ded093d8115053f4b4f0833bdbb7cc4ef39d6a5d538cd377daea68c621eff6618f5e442a916e3e6535b46e4e5848a101d
Static task
static1
Malware Config
Extracted
raccoon
83fbe81dd43f775dd8af3cd619f88f428fbd9a96
-
url4cnc
https://telete.in/opa4kiprivatem
Targets
-
-
Target
e419e562494f227789f2d9a45f4ba969cbc8d04820c0d891d3b9d65112c3ae02
-
Size
496KB
-
MD5
4980339158699a120a6daaa26f89d1db
-
SHA1
4fbfc1ec600a690c69199549cdfa457ad3948bbd
-
SHA256
e419e562494f227789f2d9a45f4ba969cbc8d04820c0d891d3b9d65112c3ae02
-
SHA512
b99e59bd5b460d565e1eb27c20fad26ded093d8115053f4b4f0833bdbb7cc4ef39d6a5d538cd377daea68c621eff6618f5e442a916e3e6535b46e4e5848a101d
-
Detected phishing page
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-