Analysis
-
max time kernel
150s -
max time network
166s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-07-2021 12:47
Static task
static1
Behavioral task
behavioral1
Sample
0427b3ecda18d67665d14b989d6296fe02b74cf27b872.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
0427b3ecda18d67665d14b989d6296fe02b74cf27b872.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
0427b3ecda18d67665d14b989d6296fe02b74cf27b872.exe
-
Size
453KB
-
MD5
85ccac3064ee0b602935f2b9f5fb6656
-
SHA1
0f1d9b825b0ac2e344408eaeb84631ac042fbc8b
-
SHA256
0427b3ecda18d67665d14b989d6296fe02b74cf27b8721a5fd09cc14a92493b5
-
SHA512
48566ffe4ab1c75474dbd63cfb2911917590a20401f5ae464bff8b73dd01d329f9182627a7f4417c1e14ebdb8de69487d1d33fab99ec1a486c31aeed16c15c23
Malware Config
Extracted
Family
raccoon
Botnet
e8fb6fbcbde044a603db529c2275bbfece556557
Attributes
-
url4cnc
https://telete.in/h_ghaibin2_1
rc4.plain
rc4.plain
Signatures
-
Raccoon Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3680-114-0x00000000047B0000-0x0000000004841000-memory.dmp family_raccoon behavioral2/memory/3680-115-0x0000000000400000-0x0000000002BB5000-memory.dmp family_raccoon