General
-
Target
e4c0aad14e5e5d3d47b5128d42981561d4ae76ed98ad35a78be0a5f1db997b1e
-
Size
573KB
-
Sample
211001-pwx1ssbghl
-
MD5
699ab36fdef9da0910fa7675116128d4
-
SHA1
8e5a5968216a0b5e6f4ef18e8a2c1435bd28422d
-
SHA256
e4c0aad14e5e5d3d47b5128d42981561d4ae76ed98ad35a78be0a5f1db997b1e
-
SHA512
5f1716c64d6d750dfa10e426697090877154407174071a82805c63d53294c274a21c213febb6bb51b467ff87e6c164fc8ef06928939c7c8cc246f2cf2956a170
Static task
static1
Malware Config
Extracted
raccoon
f6d7183c9e82d2a9b81e6c0608450aa66cefb51f
-
url4cnc
https://t.me/justoprostohello
Targets
-
-
Target
e4c0aad14e5e5d3d47b5128d42981561d4ae76ed98ad35a78be0a5f1db997b1e
-
Size
573KB
-
MD5
699ab36fdef9da0910fa7675116128d4
-
SHA1
8e5a5968216a0b5e6f4ef18e8a2c1435bd28422d
-
SHA256
e4c0aad14e5e5d3d47b5128d42981561d4ae76ed98ad35a78be0a5f1db997b1e
-
SHA512
5f1716c64d6d750dfa10e426697090877154407174071a82805c63d53294c274a21c213febb6bb51b467ff87e6c164fc8ef06928939c7c8cc246f2cf2956a170
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-