Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-07-2021 13:51
Static task
static1
Behavioral task
behavioral1
Sample
9fc04fb382f60a70816945197ab1d4c0.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
9fc04fb382f60a70816945197ab1d4c0.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
9fc04fb382f60a70816945197ab1d4c0.exe
-
Size
506KB
-
MD5
9fc04fb382f60a70816945197ab1d4c0
-
SHA1
af4c9450b9726ef9b7e9319a3b333cc9ec5472cc
-
SHA256
779dfdc196d5a63adb4e8b7ba1b2b65ed8e52eaea518a1dfd735a69c3b109046
-
SHA512
5e8798fb9778d8aacc8e82fd1d3f08fbda09a864cb0063447dd31476efcd4f7b037d56c95a22b70acee461e36d270103b183269a90f8a6e753b82dddff001c41
Malware Config
Extracted
Family
raccoon
Botnet
e8fb6fbcbde044a603db529c2275bbfece556557
Attributes
-
url4cnc
https://telete.in/h_ghaibin2_1
rc4.plain
rc4.plain
Signatures
-
Raccoon Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3424-114-0x00000000047E0000-0x0000000004871000-memory.dmp family_raccoon behavioral2/memory/3424-115-0x0000000000400000-0x0000000002BC2000-memory.dmp family_raccoon