General

  • Target

    2024-05-24_392e80effcad0bec49da1cae59dfa0df_avoslocker_cobalt-strike_raccoonstealer

  • Size

    583KB

  • MD5

    392e80effcad0bec49da1cae59dfa0df

  • SHA1

    4bab8ca0b7ed256402c36a266c6eaf1a6f703b87

  • SHA256

    0d1408d64dd7b802608a667e3c0f279886432e8ebc092984d1b80558fc625596

  • SHA512

    da2fe392cfb350cf5854b23d6187f31401fccec1e3fdf7aa94e34abbb7ef3f000f82e59978dbe317a75eb11cc02c9cc66b3e96330a9659c652004bd85fd0fafd

  • SSDEEP

    12288:7RaXb/FXVHMBhx/D8WlhVe2f1yt0uWWgaRjUut26sFhmGacnBV/e:7IXbzHMBhxbhrVeOlfQof/e

Score
10/10

Malware Config

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_392e80effcad0bec49da1cae59dfa0df_avoslocker_cobalt-strike_raccoonstealer
    .exe windows:6 windows x86 arch:x86

    5bccc4ddaaaa65b3c4a43f5df51c1a02


    Headers

    Imports

    Sections