General
-
Target
41FA35AD45D4442404F2F970EE3578B8.exe
-
Size
6.6MB
-
Sample
210811-7svc57m2n6
-
MD5
41fa35ad45d4442404f2f970ee3578b8
-
SHA1
61577d5ff6b0c870d51fbb3463ce920b2cd191a7
-
SHA256
56f1c287ea437e4642a04cfb0f44f2dcc74a0eeb3204aba76fd0c64f31b0dffd
-
SHA512
778972963c3aa9119877e7ab885b14eb2eadbe9bf3bba28365fee48e4bb4ba351680a980cb2c34ceafaa2258ccd86c28ee1532667cf3aec138c647eab8819096
Static task
static1
Behavioral task
behavioral1
Sample
41FA35AD45D4442404F2F970EE3578B8.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
41FA35AD45D4442404F2F970EE3578B8.exe
Resource
win10v20210408
Malware Config
Extracted
raccoon
bb8d3701ca5d8e031967c87b862623b34997b3d1
-
url4cnc
https://telete.in/jdiamond13
Targets
-
-
Target
41FA35AD45D4442404F2F970EE3578B8.exe
-
Size
6.6MB
-
MD5
41fa35ad45d4442404f2f970ee3578b8
-
SHA1
61577d5ff6b0c870d51fbb3463ce920b2cd191a7
-
SHA256
56f1c287ea437e4642a04cfb0f44f2dcc74a0eeb3204aba76fd0c64f31b0dffd
-
SHA512
778972963c3aa9119877e7ab885b14eb2eadbe9bf3bba28365fee48e4bb4ba351680a980cb2c34ceafaa2258ccd86c28ee1532667cf3aec138c647eab8819096
-
Raccoon Stealer Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-