Analysis

  • max time kernel
    63s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-11-2020 18:32

General

  • Target

    f5a8f21a216eede8a672785d754efa4564d999dc72db8d0d03372e93a9fb03ba.exe

  • Size

    514KB

  • MD5

    fd6ace26797f628ab1fb77150a302f86

  • SHA1

    c373c9160d469f67b12a7b7b8d25f2caa6b890f3

  • SHA256

    f5a8f21a216eede8a672785d754efa4564d999dc72db8d0d03372e93a9fb03ba

  • SHA512

    ab5e64cf958ba9be024b104b54eb3a1f95f231d34042b82281af6ed197bcc38b83421ec5a2ec8eb710da486652e5af65fd95e859144a05b5e45de5064dc2ca78

Score
10/10

Malware Config

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5a8f21a216eede8a672785d754efa4564d999dc72db8d0d03372e93a9fb03ba.exe
    "C:\Users\Admin\AppData\Local\Temp\f5a8f21a216eede8a672785d754efa4564d999dc72db8d0d03372e93a9fb03ba.exe"
    1⤵
    • Modifies system certificate store
    PID:1664

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1664-0-0x0000000002477000-0x0000000002478000-memory.dmp
    Filesize

    4KB

  • memory/1664-1-0x0000000003CA0000-0x0000000003CB1000-memory.dmp
    Filesize

    68KB