General
-
Target
fef5803ee404484f71ceed8736a2dac41d558c6e17182979ae591386251e6f69
-
Size
555KB
-
Sample
211001-g4dccsbaa9
-
MD5
3ce1413ef377c398c712117c71d839f4
-
SHA1
6564ec0e552b8b3820afa963d11b82ee79022564
-
SHA256
fef5803ee404484f71ceed8736a2dac41d558c6e17182979ae591386251e6f69
-
SHA512
c3f71c0947e834dc785c3d037b73f5726a1bc5a4d2f6618c42a5a141528127ff8bb28f08eac528998904211e5bbf8da24ace550bab1d566f68761041d71e6311
Static task
static1
Behavioral task
behavioral1
Sample
fef5803ee404484f71ceed8736a2dac41d558c6e17182979ae591386251e6f69.exe
Resource
win10-en-20210920
Malware Config
Extracted
raccoon
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Targets
-
-
Target
fef5803ee404484f71ceed8736a2dac41d558c6e17182979ae591386251e6f69
-
Size
555KB
-
MD5
3ce1413ef377c398c712117c71d839f4
-
SHA1
6564ec0e552b8b3820afa963d11b82ee79022564
-
SHA256
fef5803ee404484f71ceed8736a2dac41d558c6e17182979ae591386251e6f69
-
SHA512
c3f71c0947e834dc785c3d037b73f5726a1bc5a4d2f6618c42a5a141528127ff8bb28f08eac528998904211e5bbf8da24ace550bab1d566f68761041d71e6311
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-