Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    26-09-2021 11:46

General

  • Target

    usfive_20210917-214437.exe

  • Size

    476KB

  • MD5

    c0c182592634e934ba60ec571f0f6ee3

  • SHA1

    998a8101eb4203252e237aa41a14b2ba8d1dc5dd

  • SHA256

    5370a7927a9f0adf41b549fd3dd61ccddb827c9ad6d57fea6da5bdd1586d41d7

  • SHA512

    a36f803bb41b4725aed8200ebe6cab556e2f7ae91e598a57ae17426f6197a90aeb51c97ea9abb5e9f56d7e37a5eee3be4fd70f5b5c74611867fd055e2fe503fc

Malware Config

Extracted

Family

raccoon

Botnet

a8a04412b0db5dca0e2f7ee3c6455e08fdf3f698

Attributes
  • url4cnc

    https://telete.in/h_electricryptors2

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\usfive_20210917-214437.exe
    "C:\Users\Admin\AppData\Local\Temp\usfive_20210917-214437.exe"
    1⤵
      PID:4088

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4088-115-0x0000000000590000-0x00000000006DA000-memory.dmp
      Filesize

      1.3MB

    • memory/4088-116-0x0000000000400000-0x00000000004FD000-memory.dmp
      Filesize

      1012KB