General
-
Target
65251784a74533dc010ce48b293c13ff.exe
-
Size
419KB
-
Sample
210927-frxpssffgn
-
MD5
65251784a74533dc010ce48b293c13ff
-
SHA1
6e0c4d8c7177d32c46a4a5887e7f4d1a0c53224b
-
SHA256
671d36b162c116fd9d3276fc9010e4b39062a4f48bc47ab980059eef1b375a12
-
SHA512
660a2ed3e57ea9cc231f03cebfe82a29825bd0ba1bc6b6b994898ca1932bb9f02633d9a21e02706074f358eaf19b0cdd6497abbbb22c026e398395acea559e3a
Static task
static1
Behavioral task
behavioral1
Sample
65251784a74533dc010ce48b293c13ff.exe
Resource
win7-en-20210920
Malware Config
Extracted
raccoon
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Targets
-
-
Target
65251784a74533dc010ce48b293c13ff.exe
-
Size
419KB
-
MD5
65251784a74533dc010ce48b293c13ff
-
SHA1
6e0c4d8c7177d32c46a4a5887e7f4d1a0c53224b
-
SHA256
671d36b162c116fd9d3276fc9010e4b39062a4f48bc47ab980059eef1b375a12
-
SHA512
660a2ed3e57ea9cc231f03cebfe82a29825bd0ba1bc6b6b994898ca1932bb9f02633d9a21e02706074f358eaf19b0cdd6497abbbb22c026e398395acea559e3a
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-