General
-
Target
d67d7badb25a9e63e5ac5faa811e3ff89c6d3f0d61d733edd3ec7c17c0ef6fc4
-
Size
477KB
-
Sample
210807-zy36395k8n
-
MD5
156ec73ca0f8a6376da93656451011da
-
SHA1
65c0d878344d733985a83181ce14fd0557546254
-
SHA256
d67d7badb25a9e63e5ac5faa811e3ff89c6d3f0d61d733edd3ec7c17c0ef6fc4
-
SHA512
ef4bd43e58c1f50b420bd7aa5a25b023b4263db019675c8dc448d1cee4b0785ba9de7ad938e81689c4612702797561e9605adc034d249d2913f329da8a76bfba
Static task
static1
Behavioral task
behavioral1
Sample
d67d7badb25a9e63e5ac5faa811e3ff89c6d3f0d61d733edd3ec7c17c0ef6fc4.exe
Resource
win10v20210410
Malware Config
Extracted
raccoon
83fbe81dd43f775dd8af3cd619f88f428fbd9a96
-
url4cnc
https://telete.in/opa4kiprivatem
Targets
-
-
Target
d67d7badb25a9e63e5ac5faa811e3ff89c6d3f0d61d733edd3ec7c17c0ef6fc4
-
Size
477KB
-
MD5
156ec73ca0f8a6376da93656451011da
-
SHA1
65c0d878344d733985a83181ce14fd0557546254
-
SHA256
d67d7badb25a9e63e5ac5faa811e3ff89c6d3f0d61d733edd3ec7c17c0ef6fc4
-
SHA512
ef4bd43e58c1f50b420bd7aa5a25b023b4263db019675c8dc448d1cee4b0785ba9de7ad938e81689c4612702797561e9605adc034d249d2913f329da8a76bfba
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-