General
-
Target
8a45a0077a84d7b42e5dfaaf5fc975ac.exe
-
Size
494KB
-
Sample
210930-zv3vrsaefl
-
MD5
8a45a0077a84d7b42e5dfaaf5fc975ac
-
SHA1
53b1b117abb74f984900eaa16deaba8a6c4b04dc
-
SHA256
18c798282da89986a2aeaf8b9d85e4f3d70e991dc5186937f40e6802be3da549
-
SHA512
561937687f3ffcbf6bff1844825fdc58876183942573704ebb5e1ceeee5146ed3dddc532257a5f5259fa12f0cc500c4c01379ab680649f4db50da3cb7ff6133d
Static task
static1
Behavioral task
behavioral1
Sample
8a45a0077a84d7b42e5dfaaf5fc975ac.exe
Resource
win7-en-20210920
Malware Config
Extracted
raccoon
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Targets
-
-
Target
8a45a0077a84d7b42e5dfaaf5fc975ac.exe
-
Size
494KB
-
MD5
8a45a0077a84d7b42e5dfaaf5fc975ac
-
SHA1
53b1b117abb74f984900eaa16deaba8a6c4b04dc
-
SHA256
18c798282da89986a2aeaf8b9d85e4f3d70e991dc5186937f40e6802be3da549
-
SHA512
561937687f3ffcbf6bff1844825fdc58876183942573704ebb5e1ceeee5146ed3dddc532257a5f5259fa12f0cc500c4c01379ab680649f4db50da3cb7ff6133d
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-