Resubmissions

27-02-2020 14:25

200227-3wh35qrwk6 10

20-02-2020 19:34

200220-hlck41efds 10

Analysis

  • max time kernel
    107s
  • max time network
    108s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    27-02-2020 14:25

General

  • Target

    out.exe

  • Size

    439KB

  • MD5

    dc47c83aa99bb69fd38e73b3554afddb

  • SHA1

    3a6db3a80fdcd23ecde4b07404496cf6dcc481b0

  • SHA256

    3e43cb34fdc8fc2ba11d51b1c157a76296e34c2ad541f60cc9d4459720b3893d

  • SHA512

    b509e796f4183f730a74656268890ecefc6d7b554137fc9632225666616a8ba566a680ce0295aad32ca9039195c62e1388fba4ea9de2efcb95bfd41e55034773

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Modifies system certificate store 2 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\out.exe
    "C:\Users\Admin\AppData\Local\Temp\out.exe"
    1⤵
    • Modifies system certificate store
    PID:1860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1860-0-0x0000000003B69000-0x0000000003B6A000-memory.dmp

    Filesize

    4KB

  • memory/1860-1-0x0000000003C50000-0x0000000003C61000-memory.dmp

    Filesize

    68KB