General
-
Target
03e733b945ade5db2e556118d728a9e1b88b8d2e53b6151ca78ef84aebdb0906
-
Size
419KB
-
Sample
210926-vpp99sfahk
-
MD5
da5db24613bb10990b4e3e8960c60635
-
SHA1
a6da4972cf39cb66e5445be591896a76932c29f9
-
SHA256
03e733b945ade5db2e556118d728a9e1b88b8d2e53b6151ca78ef84aebdb0906
-
SHA512
eaa589756153e112a780484c0c5899593f88560d79bf2af99660bd52ff594930d611747bd474c8e186e8885a832962f06daf83b83eb5aceff50bd86acd2ef2e4
Static task
static1
Malware Config
Extracted
raccoon
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Targets
-
-
Target
03e733b945ade5db2e556118d728a9e1b88b8d2e53b6151ca78ef84aebdb0906
-
Size
419KB
-
MD5
da5db24613bb10990b4e3e8960c60635
-
SHA1
a6da4972cf39cb66e5445be591896a76932c29f9
-
SHA256
03e733b945ade5db2e556118d728a9e1b88b8d2e53b6151ca78ef84aebdb0906
-
SHA512
eaa589756153e112a780484c0c5899593f88560d79bf2af99660bd52ff594930d611747bd474c8e186e8885a832962f06daf83b83eb5aceff50bd86acd2ef2e4
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-