Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    15-11-2021 06:56

General

  • Target

    38c20b75b08ad17240324b80def4af43.exe

  • Size

    500KB

  • MD5

    38c20b75b08ad17240324b80def4af43

  • SHA1

    c5eaca0062acd39bba2b302e839b8aab754376a8

  • SHA256

    7b299721449e841ed6e5c241c4e686cc3c1f0554ce8427a5c9fa986be99e6298

  • SHA512

    16cbe30c1f702d45aaf7d22f7d379eb589d6e27d2e6f4144e21e3545b3e3008d3979fca769d16c6ebc2b1186edbbde4903dcc9f53b197741532142375c2c7ef9

Malware Config

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

675718a5f2ce6d3cacf6cb04a512f5637eae995f

Attributes
  • url4cnc

    http://91.219.236.27/agrybirdsgamerept

    http://5.181.156.92/agrybirdsgamerept

    http://91.219.236.207/agrybirdsgamerept

    http://185.225.19.18/agrybirdsgamerept

    http://91.219.237.227/agrybirdsgamerept

    http://185.163.47.176/agrybirdsgamerept

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\38c20b75b08ad17240324b80def4af43.exe
    "C:\Users\Admin\AppData\Local\Temp\38c20b75b08ad17240324b80def4af43.exe"
    1⤵
      PID:648

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/648-116-0x0000000002200000-0x000000000228F000-memory.dmp
      Filesize

      572KB

    • memory/648-115-0x0000000000500000-0x000000000064A000-memory.dmp
      Filesize

      1.3MB

    • memory/648-117-0x0000000000400000-0x0000000000491000-memory.dmp
      Filesize

      580KB