Analysis

  • max time kernel
    144s
  • max time network
    157s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    01-06-2021 02:26

General

  • Target

    58b8dc36e66a23b3ce97cf7818d0eb06.exe

  • Size

    582KB

  • MD5

    58b8dc36e66a23b3ce97cf7818d0eb06

  • SHA1

    5d3ec25cd4cc4885f85753d773e7da05cef3b46d

  • SHA256

    209fba0ad040546a0732332b958ca53a53f87b9253ae365f0248939213718012

  • SHA512

    eef4bd796c3bd6077c5a2923fd2f19275aad1d3774f483f150970bed283d66699effb5f7328be8e034ccbb18a2210057ee088748734de20ba71fd8c8bcdff565

Malware Config

Extracted

Family

raccoon

Botnet

a5cce470ad0d57aff9fa94b5ee2c0c1fc2d802af

Attributes
  • url4cnc

    https://tttttt.me/baudemars

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\58b8dc36e66a23b3ce97cf7818d0eb06.exe
    "C:\Users\Admin\AppData\Local\Temp\58b8dc36e66a23b3ce97cf7818d0eb06.exe"
    1⤵
      PID:636

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/636-114-0x0000000000530000-0x000000000067A000-memory.dmp
      Filesize

      1.3MB

    • memory/636-115-0x0000000000400000-0x0000000000499000-memory.dmp
      Filesize

      612KB