General
-
Target
1052e6c1aca3436429645b95e4ad56bb.exe
-
Size
423KB
-
Sample
210926-vm41msfagp
-
MD5
1052e6c1aca3436429645b95e4ad56bb
-
SHA1
7e9cb46559fab8d3cd92ed30fdde8d4b0453b141
-
SHA256
a6fd5456fcd9d23bebc37c813f0208c7187a9e39263c197b3faae0d56ee60c33
-
SHA512
357dc65eb00bb080d0eef4f1ba1fd8e7e984b9f1a71dd3f8bb7509478b2c48cae044edcf62da36681a8b73c0cbdfda824698f8823b7bc71ee99633dd6cbab24c
Static task
static1
Behavioral task
behavioral1
Sample
1052e6c1aca3436429645b95e4ad56bb.exe
Resource
win7v20210408
Malware Config
Extracted
raccoon
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Targets
-
-
Target
1052e6c1aca3436429645b95e4ad56bb.exe
-
Size
423KB
-
MD5
1052e6c1aca3436429645b95e4ad56bb
-
SHA1
7e9cb46559fab8d3cd92ed30fdde8d4b0453b141
-
SHA256
a6fd5456fcd9d23bebc37c813f0208c7187a9e39263c197b3faae0d56ee60c33
-
SHA512
357dc65eb00bb080d0eef4f1ba1fd8e7e984b9f1a71dd3f8bb7509478b2c48cae044edcf62da36681a8b73c0cbdfda824698f8823b7bc71ee99633dd6cbab24c
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-