General
-
Target
c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8
-
Size
512KB
-
Sample
211002-l7m37aecfj
-
MD5
de53e8d73fe96e1ceab93e3aee4751ec
-
SHA1
98e010e66213ba828ead9debe86263bca9407509
-
SHA256
c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8
-
SHA512
e2e692971b0fb5b1244b08e952045f6b342f968a2f5ba8f3d28b3e4cd0bf34af89c63a1923ca16991c43e6376cbab113b3c43d194dc8639ce8d04881bfdc95c5
Static task
static1
Behavioral task
behavioral1
Sample
c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8.exe
Resource
win10v20210408
Malware Config
Extracted
raccoon
1.8.2
fd16367b73441d6f39c715f71a74a399a84f0b41
-
url4cnc
http://teletop.top/terra11nc
http://teleta.top/terra11nc
https://t.me/terra11nc
Targets
-
-
Target
c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8
-
Size
512KB
-
MD5
de53e8d73fe96e1ceab93e3aee4751ec
-
SHA1
98e010e66213ba828ead9debe86263bca9407509
-
SHA256
c8457e14bf16d40d5e7f36f81982957ffa6cd2fe17a7c1a37333a133effc41a8
-
SHA512
e2e692971b0fb5b1244b08e952045f6b342f968a2f5ba8f3d28b3e4cd0bf34af89c63a1923ca16991c43e6376cbab113b3c43d194dc8639ce8d04881bfdc95c5
-
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
-
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-