Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    31-05-2021 06:31

General

  • Target

    eca6cec3cc7fa720507e9c9ae2180817.exe

  • Size

    576KB

  • MD5

    eca6cec3cc7fa720507e9c9ae2180817

  • SHA1

    4c28507c93931f4b7a0bca56604cbef6753e74e7

  • SHA256

    43a2888a2f23883553213e022bd59be37ef6dab68bc52f8a796df7041075f693

  • SHA512

    b65f974c73e9943a0ee270a6588fcbcec4e9107a9803d0ce25901b5e90b7ef8ad603ed3fbfa6858d7dc125372404ab21cd5eab9e527dbacd5f0a8bd8623f8a4c

Malware Config

Extracted

Family

raccoon

Botnet

a5cce470ad0d57aff9fa94b5ee2c0c1fc2d802af

Attributes
  • url4cnc

    https://tttttt.me/baudemars

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eca6cec3cc7fa720507e9c9ae2180817.exe
    "C:\Users\Admin\AppData\Local\Temp\eca6cec3cc7fa720507e9c9ae2180817.exe"
    1⤵
      PID:852

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/852-114-0x0000000000730000-0x00000000007C1000-memory.dmp
      Filesize

      580KB

    • memory/852-115-0x0000000000400000-0x0000000000498000-memory.dmp
      Filesize

      608KB