Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    01-10-2021 01:22

General

  • Target

    a0d92e4d0e94ad42f73031cb205c1022.exe

  • Size

    430KB

  • MD5

    a0d92e4d0e94ad42f73031cb205c1022

  • SHA1

    748702d3f431aa1c352170c99677c5eb88e2f293

  • SHA256

    5cd6d407701a56e39d3419a3b0eed380ec7a4949987471294dff731d7827dffa

  • SHA512

    579d399fa85425b3d9f206a55183fdf1b28be11b912ecef69c016de34c96d1949812f13666be1e187484071d4a3c92c1779284dc59f0b79de3cf3087454e70c3

Malware Config

Extracted

Family

raccoon

Botnet

f6d7183c9e82d2a9b81e6c0608450aa66cefb51f

Attributes
  • url4cnc

    https://t.me/justoprostohello

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0d92e4d0e94ad42f73031cb205c1022.exe
    "C:\Users\Admin\AppData\Local\Temp\a0d92e4d0e94ad42f73031cb205c1022.exe"
    1⤵
      PID:1272

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1272-53-0x0000000075331000-0x0000000075333000-memory.dmp
      Filesize

      8KB

    • memory/1272-54-0x0000000000290000-0x0000000000320000-memory.dmp
      Filesize

      576KB

    • memory/1272-55-0x0000000000400000-0x00000000004F2000-memory.dmp
      Filesize

      968KB