General
-
Target
a0d92e4d0e94ad42f73031cb205c1022.exe
-
Size
430KB
-
Sample
211001-bq89zsaffp
-
MD5
a0d92e4d0e94ad42f73031cb205c1022
-
SHA1
748702d3f431aa1c352170c99677c5eb88e2f293
-
SHA256
5cd6d407701a56e39d3419a3b0eed380ec7a4949987471294dff731d7827dffa
-
SHA512
579d399fa85425b3d9f206a55183fdf1b28be11b912ecef69c016de34c96d1949812f13666be1e187484071d4a3c92c1779284dc59f0b79de3cf3087454e70c3
Static task
static1
Behavioral task
behavioral1
Sample
a0d92e4d0e94ad42f73031cb205c1022.exe
Resource
win7-en-20210920
Malware Config
Extracted
raccoon
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Targets
-
-
Target
a0d92e4d0e94ad42f73031cb205c1022.exe
-
Size
430KB
-
MD5
a0d92e4d0e94ad42f73031cb205c1022
-
SHA1
748702d3f431aa1c352170c99677c5eb88e2f293
-
SHA256
5cd6d407701a56e39d3419a3b0eed380ec7a4949987471294dff731d7827dffa
-
SHA512
579d399fa85425b3d9f206a55183fdf1b28be11b912ecef69c016de34c96d1949812f13666be1e187484071d4a3c92c1779284dc59f0b79de3cf3087454e70c3
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-