General
-
Target
6b59c75e8127d2bf323547721e632a59cbe8e4a1f96206e6fed4fe650889143a
-
Size
477KB
-
Sample
210807-yn3rz1t8kn
-
MD5
d304f8b25ee3b955986048c6f936a935
-
SHA1
5590d3bf55ba857dced007520b670ab25a8ad5d2
-
SHA256
6b59c75e8127d2bf323547721e632a59cbe8e4a1f96206e6fed4fe650889143a
-
SHA512
6051e60d7a34d8009236daea9cdf263850f71586101212ca5cd8b1852f6b93e195557ded8efda202df660fc49753d5336e417851e811a62a843b63dad7b9c6e7
Static task
static1
Malware Config
Extracted
raccoon
83fbe81dd43f775dd8af3cd619f88f428fbd9a96
-
url4cnc
https://telete.in/opa4kiprivatem
Targets
-
-
Target
6b59c75e8127d2bf323547721e632a59cbe8e4a1f96206e6fed4fe650889143a
-
Size
477KB
-
MD5
d304f8b25ee3b955986048c6f936a935
-
SHA1
5590d3bf55ba857dced007520b670ab25a8ad5d2
-
SHA256
6b59c75e8127d2bf323547721e632a59cbe8e4a1f96206e6fed4fe650889143a
-
SHA512
6051e60d7a34d8009236daea9cdf263850f71586101212ca5cd8b1852f6b93e195557ded8efda202df660fc49753d5336e417851e811a62a843b63dad7b9c6e7
-
Detected phishing page
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-