General
-
Target
af4d1f1a0887822d0c2fb02f3e6c3ad6.exe
-
Size
555KB
-
Sample
211001-kw669abdaq
-
MD5
af4d1f1a0887822d0c2fb02f3e6c3ad6
-
SHA1
01c5fadaa26b93f20d66a3a0982ef48baa970db2
-
SHA256
e108e203e4b31615afcf88bddfed51dd499f6a1628fa93b7d9072400259ecc5b
-
SHA512
a2fd88dc1f56fe4772a4c364aa772d96305f116baf2b65f1b4a251c6fea26152766aeeda8b287eb12184432fb28de32788f77f1194c400c3730edff603e75e6e
Static task
static1
Behavioral task
behavioral1
Sample
af4d1f1a0887822d0c2fb02f3e6c3ad6.exe
Resource
win7v20210408
Malware Config
Extracted
raccoon
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Targets
-
-
Target
af4d1f1a0887822d0c2fb02f3e6c3ad6.exe
-
Size
555KB
-
MD5
af4d1f1a0887822d0c2fb02f3e6c3ad6
-
SHA1
01c5fadaa26b93f20d66a3a0982ef48baa970db2
-
SHA256
e108e203e4b31615afcf88bddfed51dd499f6a1628fa93b7d9072400259ecc5b
-
SHA512
a2fd88dc1f56fe4772a4c364aa772d96305f116baf2b65f1b4a251c6fea26152766aeeda8b287eb12184432fb28de32788f77f1194c400c3730edff603e75e6e
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-