General
-
Target
affb7dbf9afd509b9ab184b02bddb171.exe
-
Size
495KB
-
Sample
211001-esls9aahbl
-
MD5
affb7dbf9afd509b9ab184b02bddb171
-
SHA1
432a0a51ff8561e271ecebdcd5114ae894c671db
-
SHA256
76a6295a7b1e6854ab42e24d1ecca629d45203fb759575dad0fdb5e2e3150ee9
-
SHA512
74b901db573313c68e295e5a533972cb8143359beddab350938a97f05ce8c09eb2222afcb7b54e9d05eb604cb09f07f817e2be1346bfbea99148fd0843343e43
Static task
static1
Behavioral task
behavioral1
Sample
affb7dbf9afd509b9ab184b02bddb171.exe
Resource
win7-en-20210920
Malware Config
Extracted
raccoon
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Targets
-
-
Target
affb7dbf9afd509b9ab184b02bddb171.exe
-
Size
495KB
-
MD5
affb7dbf9afd509b9ab184b02bddb171
-
SHA1
432a0a51ff8561e271ecebdcd5114ae894c671db
-
SHA256
76a6295a7b1e6854ab42e24d1ecca629d45203fb759575dad0fdb5e2e3150ee9
-
SHA512
74b901db573313c68e295e5a533972cb8143359beddab350938a97f05ce8c09eb2222afcb7b54e9d05eb604cb09f07f817e2be1346bfbea99148fd0843343e43
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-