Analysis

  • max time kernel
    17s
  • max time network
    114s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    11-11-2020 10:55

General

  • Target

    d72fff3e7da2517c24fcb6aed1fe0b602f283421092dd470be8cee458aa6d6e0.exe

  • Size

    435KB

  • MD5

    ae55d47a050f60be3b3cc00ea8575bc6

  • SHA1

    a5314eb3853a8f07e89d7d6cac031323ebaecdf1

  • SHA256

    d72fff3e7da2517c24fcb6aed1fe0b602f283421092dd470be8cee458aa6d6e0

  • SHA512

    7a868c0252f9231d805cade18d7c312fc1deb61318c13e12f103f0239a439e7686ef799ab4fb90d7662aad7de3de483c027890449ef8f630381b8fe5539b816c

Score
10/10

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d72fff3e7da2517c24fcb6aed1fe0b602f283421092dd470be8cee458aa6d6e0.exe
    "C:\Users\Admin\AppData\Local\Temp\d72fff3e7da2517c24fcb6aed1fe0b602f283421092dd470be8cee458aa6d6e0.exe"
    1⤵
      PID:984

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/984-0-0x0000000003553000-0x0000000003554000-memory.dmp
      Filesize

      4KB

    • memory/984-1-0x0000000003880000-0x0000000003881000-memory.dmp
      Filesize

      4KB