Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    14-11-2021 22:01

General

  • Target

    d5417bd4f17d95f5c1f8d49d9af9d9e56efd4aecf50e1914ca357f3fe97d74be.exe

  • Size

    500KB

  • MD5

    a5d467191217054a7d2b9e20ec0664f1

  • SHA1

    ba76329e5951b37b7d430c35b51ceb6999553498

  • SHA256

    d5417bd4f17d95f5c1f8d49d9af9d9e56efd4aecf50e1914ca357f3fe97d74be

  • SHA512

    68543f4ba48361b069046cf467c53f203d551c1451d656ff85afa58ed7f00c90c0a230c747d5e001a8012963091ee494305c136c66bda24277f252920c7bfdbb

Malware Config

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

675718a5f2ce6d3cacf6cb04a512f5637eae995f

Attributes
  • url4cnc

    http://91.219.236.27/agrybirdsgamerept

    http://5.181.156.92/agrybirdsgamerept

    http://91.219.236.207/agrybirdsgamerept

    http://185.225.19.18/agrybirdsgamerept

    http://91.219.237.227/agrybirdsgamerept

    http://185.163.47.176/agrybirdsgamerept

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5417bd4f17d95f5c1f8d49d9af9d9e56efd4aecf50e1914ca357f3fe97d74be.exe
    "C:\Users\Admin\AppData\Local\Temp\d5417bd4f17d95f5c1f8d49d9af9d9e56efd4aecf50e1914ca357f3fe97d74be.exe"
    1⤵
      PID:664

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/664-119-0x0000000002220000-0x00000000022AF000-memory.dmp
      Filesize

      572KB

    • memory/664-118-0x00000000021D0000-0x000000000221F000-memory.dmp
      Filesize

      316KB

    • memory/664-120-0x0000000000400000-0x0000000000491000-memory.dmp
      Filesize

      580KB