General
-
Target
cce5ffb4662a6c7b9d89ceb102d1399c.exe
-
Size
555KB
-
Sample
211001-j4eljabcer
-
MD5
cce5ffb4662a6c7b9d89ceb102d1399c
-
SHA1
ce010ac81d12d024aa09dd13800d7421f3ea388d
-
SHA256
030fb78d33341248ef601687348219db846b7fc453af8cb96384c523e9cfa6e4
-
SHA512
aadcf305c20d27402555f6faf4b381f6291fd13177dcb37e185e5b7aec209b456e9c8680e9ce1f0a0d28a3e85f724700f252c4ead7374398560647202ef95f3c
Static task
static1
Behavioral task
behavioral1
Sample
cce5ffb4662a6c7b9d89ceb102d1399c.exe
Resource
win7-en-20210920
Malware Config
Extracted
raccoon
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Targets
-
-
Target
cce5ffb4662a6c7b9d89ceb102d1399c.exe
-
Size
555KB
-
MD5
cce5ffb4662a6c7b9d89ceb102d1399c
-
SHA1
ce010ac81d12d024aa09dd13800d7421f3ea388d
-
SHA256
030fb78d33341248ef601687348219db846b7fc453af8cb96384c523e9cfa6e4
-
SHA512
aadcf305c20d27402555f6faf4b381f6291fd13177dcb37e185e5b7aec209b456e9c8680e9ce1f0a0d28a3e85f724700f252c4ead7374398560647202ef95f3c
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-