Analysis

  • max time kernel
    125s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-11-2020 17:45

General

  • Target

    6280af1adb5999a80efd41bb5ce79fb2f306d4daf8699ef2d9c148c2c359ff71.exe

  • Size

    574KB

  • MD5

    5b9edf9ccc8374ec315fb581a93db568

  • SHA1

    f91064ceecdb7d7cf33042a3f67afd52da5e6505

  • SHA256

    6280af1adb5999a80efd41bb5ce79fb2f306d4daf8699ef2d9c148c2c359ff71

  • SHA512

    4b9ce5093610eb4db71e6f52d9ec0478fbc40e02e4d9cfbde2e1fd96b5762358f94e95e00fbd772960faa8f206cfe33957d07a0d0e095272f9ca9f2524966a01

Score
10/10

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6280af1adb5999a80efd41bb5ce79fb2f306d4daf8699ef2d9c148c2c359ff71.exe
    "C:\Users\Admin\AppData\Local\Temp\6280af1adb5999a80efd41bb5ce79fb2f306d4daf8699ef2d9c148c2c359ff71.exe"
    1⤵
    • Modifies system certificate store
    PID:1628

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads