General

  • Target

    2024-05-24_052038f3c3c00966525133da727287e9_avoslocker_cobalt-strike_raccoonstealer

  • Size

    583KB

  • MD5

    052038f3c3c00966525133da727287e9

  • SHA1

    7cc10fe11987cdc301107a78a0c2d476e4b9ac37

  • SHA256

    423f75097f80b27ae154abad360321285aa0735a4f34e8a015c6859b4e42b268

  • SHA512

    cc9e80ecd2ca0642743cfa9b1791c80a6b42fb3e50b589168b4004db80b37695ba90a8c93277ab96e859879c8abe2fdfa6919b2f0a7ba03ed11a9251ab7287aa

  • SSDEEP

    12288:7RaXb/FXVHMBhx/D8WlhVe2f1yt0uWWgaRjUut26sFh2GacnB1/e:7IXbzHMBhxbhrVeOlfMor/e

Score
10/10

Malware Config

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_052038f3c3c00966525133da727287e9_avoslocker_cobalt-strike_raccoonstealer
    .exe windows:6 windows x86 arch:x86

    5bccc4ddaaaa65b3c4a43f5df51c1a02


    Headers

    Imports

    Sections