General
-
Target
98d882cf61f9965223368be03aa58701.exe
-
Size
469KB
-
Sample
200630-w9j38rkdk2
-
MD5
98d882cf61f9965223368be03aa58701
-
SHA1
e6c7137c21ab9848fe3ac9d4d16a2e0e7ae69ed1
-
SHA256
dadd00262330390a9103ffd2dd3bac372a885a7d3cf6161d3eae10957a5bc37e
-
SHA512
2a6bf6f7d5ad023efdaf5da1b9053a939c747a631cb8e4d3abbae620d9f03ae71405d2e9aac155edc1f4f59dc3dfe96631f8e4d4eba5ab0fa293341530ce46ba
Static task
static1
Behavioral task
behavioral1
Sample
98d882cf61f9965223368be03aa58701.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
98d882cf61f9965223368be03aa58701.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Extracted
C:\Users\Admin\AppData\LocalLow\machineinfo.txt
raccoon
Targets
-
-
Target
98d882cf61f9965223368be03aa58701.exe
-
Size
469KB
-
MD5
98d882cf61f9965223368be03aa58701
-
SHA1
e6c7137c21ab9848fe3ac9d4d16a2e0e7ae69ed1
-
SHA256
dadd00262330390a9103ffd2dd3bac372a885a7d3cf6161d3eae10957a5bc37e
-
SHA512
2a6bf6f7d5ad023efdaf5da1b9053a939c747a631cb8e4d3abbae620d9f03ae71405d2e9aac155edc1f4f59dc3dfe96631f8e4d4eba5ab0fa293341530ce46ba
Score10/10-
Raccoon log file
Detects a log file produced by the Raccoon Stealer.
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-