General

  • Target

    265950d1f3298cae2e0203a0b1d43c661e6a7b4a7375227e433e5377d68ce0b6

  • Size

    1.1MB

  • Sample

    201109-zeb2n9e482

  • MD5

    ffa967291fe8f53465e17d7b6b3fa042

  • SHA1

    e2f4dd1b3af908e0367ed4b5ce9237a91a3146a7

  • SHA256

    265950d1f3298cae2e0203a0b1d43c661e6a7b4a7375227e433e5377d68ce0b6

  • SHA512

    81662827c9f7bbe8a745960e455442ac70620cbaac9142536cadda44c4b880bc5c19172d85d69e7bbcf4bdbfd6c2122edb2353ec03805dca3275d46bc8156290

Score
10/10

Malware Config

Targets

    • Target

      265950d1f3298cae2e0203a0b1d43c661e6a7b4a7375227e433e5377d68ce0b6

    • Size

      1.1MB

    • MD5

      ffa967291fe8f53465e17d7b6b3fa042

    • SHA1

      e2f4dd1b3af908e0367ed4b5ce9237a91a3146a7

    • SHA256

      265950d1f3298cae2e0203a0b1d43c661e6a7b4a7375227e433e5377d68ce0b6

    • SHA512

      81662827c9f7bbe8a745960e455442ac70620cbaac9142536cadda44c4b880bc5c19172d85d69e7bbcf4bdbfd6c2122edb2353ec03805dca3275d46bc8156290

    Score
    10/10
    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks