General
-
Target
bead5dfd7b20f087a2439a4268416897.exe
-
Size
468KB
-
Sample
200630-vyaxpdrc8e
-
MD5
bead5dfd7b20f087a2439a4268416897
-
SHA1
fc6776a54cfb15967aabea74c131c86c1e8f1fcd
-
SHA256
d4580d369c916d7b10d162f0569a80211f87591905a8a1514b660f10e77f3ec7
-
SHA512
2906f6052af1b149067b5cbb9b9e9f967f988489cf443f651ce8482bf09f7095885ab6a46f4c728fd0c06d463b52211b3feae10162eb9e56d7033466128e2928
Static task
static1
Behavioral task
behavioral1
Sample
bead5dfd7b20f087a2439a4268416897.exe
Resource
win7
Behavioral task
behavioral2
Sample
bead5dfd7b20f087a2439a4268416897.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
bead5dfd7b20f087a2439a4268416897.exe
-
Size
468KB
-
MD5
bead5dfd7b20f087a2439a4268416897
-
SHA1
fc6776a54cfb15967aabea74c131c86c1e8f1fcd
-
SHA256
d4580d369c916d7b10d162f0569a80211f87591905a8a1514b660f10e77f3ec7
-
SHA512
2906f6052af1b149067b5cbb9b9e9f967f988489cf443f651ce8482bf09f7095885ab6a46f4c728fd0c06d463b52211b3feae10162eb9e56d7033466128e2928
-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-