Resubmissions

General

  • Target

    2024-05-24_2aef499b5660a5c8b594e4109c7d099f_avoslocker_cobalt-strike_raccoonstealer

  • Size

    572KB

  • MD5

    2aef499b5660a5c8b594e4109c7d099f

  • SHA1

    ac1897f71a57b96139cd26b48c503337cea54d35

  • SHA256

    b9435603daa463622fd46d957c853bdf6ee7610537c759e44d372222315d16ca

  • SHA512

    8d28c16656a62e364beac8df75302d4cd9c6e524d12bebc9f851db76c7c7669af91a4c82d12dbb9499df280b07ef77745baa78ddf4b257860851d79f9d55892b

  • SSDEEP

    12288:QNlFn8ArT3Z/N+k8kfHax9WZi70WvlRdudnjrTJuIms327iFCUrxC3QO:cF3TZ/N+k8K6DWZ0clNF/9C3QO

Score
10/10

Malware Config

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_2aef499b5660a5c8b594e4109c7d099f_avoslocker_cobalt-strike_raccoonstealer
    .exe windows:6 windows x86 arch:x86

    51747c8f67e1906217336bcac3925924


    Headers

    Imports

    Sections