General

  • Target

    2024-05-24_ac20d1fe072fe00601186b1236b3eb52_avoslocker_cobalt-strike_raccoonstealer

  • Size

    573KB

  • MD5

    ac20d1fe072fe00601186b1236b3eb52

  • SHA1

    c605c742d151a94c7591f8c76d22bfa2afc92be6

  • SHA256

    8d48e2ddea9a44eb2da3bb627c66b21d3431a4d2095daf135f365b6480798021

  • SHA512

    3a501cdbf44732eaf3693b54ebc1a98deb32b41e595dd2c99771a1954be92204202c6e6763da434edd87aaadeb8dc21ba8cec1f9b047239cd160783a352b459f

  • SSDEEP

    12288:SkNNfKhb6z4fkvlhooipWjeWZCjyoRmCJmxLkuT+uIm3zsM0r6Erok:bNNu6z4cvlhJigSWZSERssk

Score
10/10

Malware Config

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_ac20d1fe072fe00601186b1236b3eb52_avoslocker_cobalt-strike_raccoonstealer
    .exe windows:6 windows x86 arch:x86

    51747c8f67e1906217336bcac3925924


    Headers

    Imports

    Sections