Analysis

  • max time kernel
    129s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-11-2020 21:34

General

  • Target

    93e4d81d19dddf50febbbfd1e65486eebdfb09962bc37e343dd2e95271372927.exe

  • Size

    574KB

  • MD5

    fe64e5a888f60054ebe8b482504ce06c

  • SHA1

    278cf8cbd79a78c9a6b4d9ebde73e1117a363a52

  • SHA256

    93e4d81d19dddf50febbbfd1e65486eebdfb09962bc37e343dd2e95271372927

  • SHA512

    fbd06cfb79b74ce4f0ca9ca40bde388442aa9e83f3bc623fbf77883338564f0e2448060645759ee0dc0b58a3f49a3dd645cdcbe23909c83962b55119850fe17d

Score
10/10

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\93e4d81d19dddf50febbbfd1e65486eebdfb09962bc37e343dd2e95271372927.exe
    "C:\Users\Admin\AppData\Local\Temp\93e4d81d19dddf50febbbfd1e65486eebdfb09962bc37e343dd2e95271372927.exe"
    1⤵
      PID:1400

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads