Analysis

  • max time kernel
    3s
  • max time network
    8s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-11-2020 21:34

General

  • Target

    93e4d81d19dddf50febbbfd1e65486eebdfb09962bc37e343dd2e95271372927.exe

  • Size

    574KB

  • MD5

    fe64e5a888f60054ebe8b482504ce06c

  • SHA1

    278cf8cbd79a78c9a6b4d9ebde73e1117a363a52

  • SHA256

    93e4d81d19dddf50febbbfd1e65486eebdfb09962bc37e343dd2e95271372927

  • SHA512

    fbd06cfb79b74ce4f0ca9ca40bde388442aa9e83f3bc623fbf77883338564f0e2448060645759ee0dc0b58a3f49a3dd645cdcbe23909c83962b55119850fe17d

Score
10/10

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93e4d81d19dddf50febbbfd1e65486eebdfb09962bc37e343dd2e95271372927.exe
    "C:\Users\Admin\AppData\Local\Temp\93e4d81d19dddf50febbbfd1e65486eebdfb09962bc37e343dd2e95271372927.exe"
    1⤵
    • Modifies system certificate store
    PID:1732

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads