General
-
Target
77b01d21a55c52756c16e6355c5a6ec4.exe
-
Size
430KB
-
Sample
210926-qbhk2segfl
-
MD5
77b01d21a55c52756c16e6355c5a6ec4
-
SHA1
a38f70512aad190cea6085905b9a17865c2c6db4
-
SHA256
dec0265226f1b0fcbcd3570d1fabb2b97a26b0fa575026782f169e7d1d282df5
-
SHA512
993d5df996026ae57fb0cb92908c166c2d543ad04d2ba5601153e36caba1dbc844e35e252294e2dbe2e857a64f892d0c25b26b43d4364fa7d54abad5ba109f83
Static task
static1
Behavioral task
behavioral1
Sample
77b01d21a55c52756c16e6355c5a6ec4.exe
Resource
win7-en-20210920
Malware Config
Extracted
raccoon
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Targets
-
-
Target
77b01d21a55c52756c16e6355c5a6ec4.exe
-
Size
430KB
-
MD5
77b01d21a55c52756c16e6355c5a6ec4
-
SHA1
a38f70512aad190cea6085905b9a17865c2c6db4
-
SHA256
dec0265226f1b0fcbcd3570d1fabb2b97a26b0fa575026782f169e7d1d282df5
-
SHA512
993d5df996026ae57fb0cb92908c166c2d543ad04d2ba5601153e36caba1dbc844e35e252294e2dbe2e857a64f892d0c25b26b43d4364fa7d54abad5ba109f83
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-