Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    01-10-2021 05:09

General

  • Target

    affb7dbf9afd509b9ab184b02bddb171.exe

  • Size

    495KB

  • MD5

    affb7dbf9afd509b9ab184b02bddb171

  • SHA1

    432a0a51ff8561e271ecebdcd5114ae894c671db

  • SHA256

    76a6295a7b1e6854ab42e24d1ecca629d45203fb759575dad0fdb5e2e3150ee9

  • SHA512

    74b901db573313c68e295e5a533972cb8143359beddab350938a97f05ce8c09eb2222afcb7b54e9d05eb604cb09f07f817e2be1346bfbea99148fd0843343e43

Malware Config

Extracted

Family

raccoon

Botnet

f6d7183c9e82d2a9b81e6c0608450aa66cefb51f

Attributes
  • url4cnc

    https://t.me/justoprostohello

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\affb7dbf9afd509b9ab184b02bddb171.exe
    "C:\Users\Admin\AppData\Local\Temp\affb7dbf9afd509b9ab184b02bddb171.exe"
    1⤵
      PID:1432

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1432-54-0x00000000768C1000-0x00000000768C3000-memory.dmp
      Filesize

      8KB

    • memory/1432-55-0x0000000000220000-0x00000000002B0000-memory.dmp
      Filesize

      576KB

    • memory/1432-56-0x0000000000400000-0x00000000008AB000-memory.dmp
      Filesize

      4.7MB