Analysis

  • max time kernel
    147s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    01-06-2021 02:26

General

  • Target

    58b8dc36e66a23b3ce97cf7818d0eb06.exe

  • Size

    582KB

  • MD5

    58b8dc36e66a23b3ce97cf7818d0eb06

  • SHA1

    5d3ec25cd4cc4885f85753d773e7da05cef3b46d

  • SHA256

    209fba0ad040546a0732332b958ca53a53f87b9253ae365f0248939213718012

  • SHA512

    eef4bd796c3bd6077c5a2923fd2f19275aad1d3774f483f150970bed283d66699effb5f7328be8e034ccbb18a2210057ee088748734de20ba71fd8c8bcdff565

Malware Config

Extracted

Family

raccoon

Botnet

a5cce470ad0d57aff9fa94b5ee2c0c1fc2d802af

Attributes
  • url4cnc

    https://tttttt.me/baudemars

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\58b8dc36e66a23b3ce97cf7818d0eb06.exe
    "C:\Users\Admin\AppData\Local\Temp\58b8dc36e66a23b3ce97cf7818d0eb06.exe"
    1⤵
      PID:1392

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1392-60-0x0000000075D51000-0x0000000075D53000-memory.dmp
      Filesize

      8KB

    • memory/1392-61-0x0000000000220000-0x00000000002B1000-memory.dmp
      Filesize

      580KB

    • memory/1392-62-0x0000000000400000-0x0000000000499000-memory.dmp
      Filesize

      612KB