Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
11-03-2022 22:10
Static task
static1
Behavioral task
behavioral1
Sample
354d08e5328a5ff62c2d78e3c66194b52dc4907a4cdb624c0aef4b4a72d2fd9e.exe
Resource
win10-20220223-en
General
-
Target
354d08e5328a5ff62c2d78e3c66194b52dc4907a4cdb624c0aef4b4a72d2fd9e.exe
-
Size
552KB
-
MD5
84b588bd8f90e7218aac86a745a5cd0f
-
SHA1
72d06b62d37c84195689a516a03f78b7509febb0
-
SHA256
354d08e5328a5ff62c2d78e3c66194b52dc4907a4cdb624c0aef4b4a72d2fd9e
-
SHA512
49fa1a0a79580eba1a49d88c18e8ea3e18b5484c006564f8bc49b9bcad543edf1e303f59df71e956672d78840d0299e7745813ef6ba8bd6df8cd5dda76b553d9
Malware Config
Extracted
raccoon
1c0fad6805a0f65d7b597130eb9f089ffbe9857d
-
url4cnc
http://194.180.191.241/capibar
http://103.155.93.35/capibar
https://t.me/capibar
Signatures
-
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
-
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3800 3536 WerFault.exe 354d08e5328a5ff62c2d78e3c66194b52dc4907a4cdb624c0aef4b4a72d2fd9e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\354d08e5328a5ff62c2d78e3c66194b52dc4907a4cdb624c0aef4b4a72d2fd9e.exe"C:\Users\Admin\AppData\Local\Temp\354d08e5328a5ff62c2d78e3c66194b52dc4907a4cdb624c0aef4b4a72d2fd9e.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 9322⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3536-114-0x00000000007FA000-0x000000000084A000-memory.dmpFilesize
320KB
-
memory/3536-115-0x00000000007FA000-0x000000000084A000-memory.dmpFilesize
320KB
-
memory/3536-116-0x0000000002280000-0x0000000002312000-memory.dmpFilesize
584KB
-
memory/3536-117-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB