Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    15-11-2021 02:30

General

  • Target

    7b299721449e841ed6e5c241c4e686cc3c1f0554ce8427a5c9fa986be99e6298.exe

  • Size

    500KB

  • MD5

    38c20b75b08ad17240324b80def4af43

  • SHA1

    c5eaca0062acd39bba2b302e839b8aab754376a8

  • SHA256

    7b299721449e841ed6e5c241c4e686cc3c1f0554ce8427a5c9fa986be99e6298

  • SHA512

    16cbe30c1f702d45aaf7d22f7d379eb589d6e27d2e6f4144e21e3545b3e3008d3979fca769d16c6ebc2b1186edbbde4903dcc9f53b197741532142375c2c7ef9

Malware Config

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

675718a5f2ce6d3cacf6cb04a512f5637eae995f

Attributes
  • url4cnc

    http://91.219.236.27/agrybirdsgamerept

    http://5.181.156.92/agrybirdsgamerept

    http://91.219.236.207/agrybirdsgamerept

    http://185.225.19.18/agrybirdsgamerept

    http://91.219.237.227/agrybirdsgamerept

    http://185.163.47.176/agrybirdsgamerept

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b299721449e841ed6e5c241c4e686cc3c1f0554ce8427a5c9fa986be99e6298.exe
    "C:\Users\Admin\AppData\Local\Temp\7b299721449e841ed6e5c241c4e686cc3c1f0554ce8427a5c9fa986be99e6298.exe"
    1⤵
      PID:2716

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2716-116-0x0000000002230000-0x00000000022BF000-memory.dmp
      Filesize

      572KB

    • memory/2716-115-0x00000000021E0000-0x000000000222F000-memory.dmp
      Filesize

      316KB

    • memory/2716-117-0x0000000000400000-0x0000000000491000-memory.dmp
      Filesize

      580KB