General

  • Target

    2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi

  • Size

    593KB

  • MD5

    f21bae4debf2bc660f2fce8285556790

  • SHA1

    6febf83452c9c809a34ac32b77e0927c474c5c89

  • SHA256

    4394703b75ca6de35ab20fd34d4669955617f9420c95a1191ee0aa7cc5ca997a

  • SHA512

    97427930525dd120d06f8ef10affa391a6b262ef1347a51b4fbf7ce64a570ed4515d8b433117d237a68668ea3e16c3d8cdaca6d8f5bb4475ab1aabd64ff980f3

  • SSDEEP

    12288:87AVwypN9NnwDLaDHZoFBHq3Ad4Dqo3XWRsauaabCuJ583f:EkX9JwDLaDHZoFs3ACcRQaaGn3f

Score
10/10

Malware Config

Signatures

  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_f21bae4debf2bc660f2fce8285556790_avoslocker_cobalt-strike_raccoonstealer_wapomi
    .exe windows:6 windows x86 arch:x86

    32006b4f5f2216b7baee1433a001f6f6


    Headers

    Imports

    Sections