Analysis

  • max time kernel
    131s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    20-01-2022 12:17

General

  • Target

    bd1deb82ba2140eae3299f419783bab0.exe

  • Size

    670KB

  • MD5

    bd1deb82ba2140eae3299f419783bab0

  • SHA1

    f124c0e4ad7be58a85271f74b8c9e5d671d70aba

  • SHA256

    b31474d8c16181a103a6ac36d9277eb7ac5dbb7261cfa74f82adbc8b2d06d3fa

  • SHA512

    458d1039347120665ccc01489e3185e660b442b4e47dab534d5591e5aabd2473eaa5d8f0710c0c3aeebf28ccc95007529357add14bae6d8b212789cae06bc846

Malware Config

Extracted

Family

raccoon

Version

1.8.5

Botnet

470193d69fd872b73819c5e70dc68242c10ccbce

Attributes
  • url4cnc

    http://185.163.204.22/capibar

    http://178.62.113.205/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd1deb82ba2140eae3299f419783bab0.exe
    "C:\Users\Admin\AppData\Local\Temp\bd1deb82ba2140eae3299f419783bab0.exe"
    1⤵
      PID:1720

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1720-54-0x00000000002F0000-0x0000000000361000-memory.dmp
      Filesize

      452KB

    • memory/1720-55-0x0000000000620000-0x00000000006B3000-memory.dmp
      Filesize

      588KB

    • memory/1720-56-0x0000000000400000-0x0000000000619000-memory.dmp
      Filesize

      2.1MB

    • memory/1720-57-0x00000000006E0000-0x00000000007C0000-memory.dmp
      Filesize

      896KB

    • memory/1720-59-0x0000000075601000-0x0000000075603000-memory.dmp
      Filesize

      8KB

    • memory/1720-58-0x0000000000400000-0x0000000000619000-memory.dmp
      Filesize

      2.1MB

    • memory/1720-60-0x0000000001F50000-0x0000000001FE2000-memory.dmp
      Filesize

      584KB

    • memory/1720-61-0x0000000000400000-0x0000000000619000-memory.dmp
      Filesize

      2.1MB