Analysis

  • max time kernel
    15s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    08-11-2020 14:10

General

  • Target

    e6dd1d0a155d080be961841554f9fc1c82f327cd4129088a3aa873f303a3bb8d.exe

  • Size

    455KB

  • MD5

    836f06411dc672fc46ed79489079e2c3

  • SHA1

    53d1488590b59528d0d47203bd996b2f6876e726

  • SHA256

    e6dd1d0a155d080be961841554f9fc1c82f327cd4129088a3aa873f303a3bb8d

  • SHA512

    0e22864b5e45e3e39f52773aeef4f2b7a456608871353428ba9d31caf86f6054a17abb293c4c3451b3e57c7e3dffe302781b11287c3018695b05e7e39b00d590

Score
10/10

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6dd1d0a155d080be961841554f9fc1c82f327cd4129088a3aa873f303a3bb8d.exe
    "C:\Users\Admin\AppData\Local\Temp\e6dd1d0a155d080be961841554f9fc1c82f327cd4129088a3aa873f303a3bb8d.exe"
    1⤵
      PID:2868

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2868-0-0x0000000000809000-0x000000000080A000-memory.dmp
      Filesize

      4KB

    • memory/2868-1-0x0000000002440000-0x0000000002441000-memory.dmp
      Filesize

      4KB