General

  • Target

    2024-05-29_6fa6a248e4f6aa6593bc88598eebd8f0_avoslocker_cobalt-strike_raccoonstealer

  • Size

    573KB

  • MD5

    6fa6a248e4f6aa6593bc88598eebd8f0

  • SHA1

    5a334ce9c49079789e39ef67bca2102a81fc2ba2

  • SHA256

    7367a18209a19b4792e572b5e9b119f6e3c7c18b7f05227ab0ebefa9407112d8

  • SHA512

    42aa1aa592656cf63204c7eaa5a832d1efadef7ad53eb0da3439281bea124ab5c22f217a1926bd348a82eb1ddc042abed7c71a98a77f1511d907801f01232b49

  • SSDEEP

    12288:D5ntsDk51T1v2AqWsmCsWZC6cm3mS5Osw4KT5uImXzsMxi8IhBQm6f:dntso1T1v2AVZXWZZqRIGbI

Score
10/10

Malware Config

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
  • Raccoon Stealer V1 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_6fa6a248e4f6aa6593bc88598eebd8f0_avoslocker_cobalt-strike_raccoonstealer
    .exe windows:6 windows x86 arch:x86

    51747c8f67e1906217336bcac3925924


    Headers

    Imports

    Sections