Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
04-12-2021 08:28
Static task
static1
Behavioral task
behavioral1
Sample
2e19613dc4b7b13c47312bfdf4ec399c.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2e19613dc4b7b13c47312bfdf4ec399c.exe
Resource
win10-en-20211104
windows10_x64
0 signatures
0 seconds
General
-
Target
2e19613dc4b7b13c47312bfdf4ec399c.exe
-
Size
528KB
-
MD5
2e19613dc4b7b13c47312bfdf4ec399c
-
SHA1
6809a37a40a224029f07c62c6308121e5d84290d
-
SHA256
ed7edd291d4c2cc21f2c75af41f1d32b2e6ae6973236d1715d83f01c76811021
-
SHA512
b939889905b7c28b217946b2185da12098ac45d0d6fe602253644d2d30f9d6c8db753c84df5cd6548c2a3b390b1c69915735240864ea0e722bfeaec05aeb620a
Malware Config
Extracted
Family
raccoon
Version
1.8.3-hotfix
Botnet
049dc5184bb65eb56e4e860bf61427e2a0fcba1e
Attributes
-
url4cnc
http://185.225.19.18/duglassa1
http://91.219.237.227/duglassa1
https://t.me/duglassa1
rc4.plain
rc4.plain
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1668-55-0x000000000060B000-0x000000000065A000-memory.dmpFilesize
316KB
-
memory/1668-56-0x0000000075901000-0x0000000075903000-memory.dmpFilesize
8KB
-
memory/1668-57-0x00000000004A0000-0x000000000052F000-memory.dmpFilesize
572KB
-
memory/1668-58-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB