General

  • Target

    2024-05-23_662241a3605783bfb0e98c6f90d56178_avoslocker_cobalt-strike_raccoonstealer

  • Size

    583KB

  • MD5

    662241a3605783bfb0e98c6f90d56178

  • SHA1

    a929ed9a6bd6ca2cde0bbd41746e593a26d7a28c

  • SHA256

    cf2f679f10d7ef7f2efb528725ea1c3e29b25242698bca2b900ec9ddb7738e1c

  • SHA512

    0b6f2f5c5642a443090d89f288fdd466e6496bec9324ad62913630671ec5dfb7c190c91c002956262d20232065f6c2ad98f90279b18f42881bdd9778b06a5f0f

  • SSDEEP

    12288:7RaXb/FXVHMBhx/D8WlhVe2f1yt0uWWgaRjUut26sFhLcGacnB//e:7IXbzHMBhxbhrVeOlfWoB/e

Score
10/10

Malware Config

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_662241a3605783bfb0e98c6f90d56178_avoslocker_cobalt-strike_raccoonstealer
    .exe windows:6 windows x86 arch:x86

    5bccc4ddaaaa65b3c4a43f5df51c1a02


    Headers

    Imports

    Sections