General
-
Target
7d195c6e5c12b60be41201ae6bf9a6f220fd7fa13d66a4e24abedbce7c3deb12
-
Size
512KB
-
Sample
210808-xlhqjvkx1x
-
MD5
1956c33c8d9ad78fd8d71e85958423f0
-
SHA1
f740bf17271ad6162e70daeb611df3dfd0d6eaf2
-
SHA256
7d195c6e5c12b60be41201ae6bf9a6f220fd7fa13d66a4e24abedbce7c3deb12
-
SHA512
d872167816345aeb8aad1ebf45f27273b0090afeba9eb20aec360b9d9f048e97e27a9764862e1b90bab1810ec5105fb4595319d580f73928e340a63712d138aa
Static task
static1
Malware Config
Extracted
raccoon
83fbe81dd43f775dd8af3cd619f88f428fbd9a96
-
url4cnc
https://telete.in/opa4kiprivatem
Targets
-
-
Target
7d195c6e5c12b60be41201ae6bf9a6f220fd7fa13d66a4e24abedbce7c3deb12
-
Size
512KB
-
MD5
1956c33c8d9ad78fd8d71e85958423f0
-
SHA1
f740bf17271ad6162e70daeb611df3dfd0d6eaf2
-
SHA256
7d195c6e5c12b60be41201ae6bf9a6f220fd7fa13d66a4e24abedbce7c3deb12
-
SHA512
d872167816345aeb8aad1ebf45f27273b0090afeba9eb20aec360b9d9f048e97e27a9764862e1b90bab1810ec5105fb4595319d580f73928e340a63712d138aa
-
Detected phishing page
-
Raccoon Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-