General
-
Target
4c9b5008f05046c2703d52d51e652823.exe
-
Size
566KB
-
Sample
211001-m51f6sbegr
-
MD5
4c9b5008f05046c2703d52d51e652823
-
SHA1
3de24e0ef558a121049b506b9db41f0e7e99d7a0
-
SHA256
fdb27f7102e4d832324d6ac9288a08b762d86cb5641d39786969409056a28a9e
-
SHA512
897c2700f271424880d140799bcfb9d175ad21d5eed54dbabfe66874cf84f4e4449fb746b1172bdec0b22636e6c3f5f89e3d9ff044074510f5bc4315f4023033
Static task
static1
Behavioral task
behavioral1
Sample
4c9b5008f05046c2703d52d51e652823.exe
Resource
win7v20210408
Malware Config
Extracted
raccoon
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Targets
-
-
Target
4c9b5008f05046c2703d52d51e652823.exe
-
Size
566KB
-
MD5
4c9b5008f05046c2703d52d51e652823
-
SHA1
3de24e0ef558a121049b506b9db41f0e7e99d7a0
-
SHA256
fdb27f7102e4d832324d6ac9288a08b762d86cb5641d39786969409056a28a9e
-
SHA512
897c2700f271424880d140799bcfb9d175ad21d5eed54dbabfe66874cf84f4e4449fb746b1172bdec0b22636e6c3f5f89e3d9ff044074510f5bc4315f4023033
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-