Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
02-05-2022 01:53
Static task
static1
Behavioral task
behavioral1
Sample
c3f193f4b5edbc7085aa15c97a4bb2e5eb65fa149198f981efbdb0df73a84e3f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c3f193f4b5edbc7085aa15c97a4bb2e5eb65fa149198f981efbdb0df73a84e3f.exe
Resource
win10v2004-20220414-en
General
-
Target
c3f193f4b5edbc7085aa15c97a4bb2e5eb65fa149198f981efbdb0df73a84e3f.exe
-
Size
494KB
-
MD5
3ca3f57ff7605cd9e91f07f8ad0f1f15
-
SHA1
8cb6e34631bdc5b9e8a8c21ec82d10ef180a6549
-
SHA256
c3f193f4b5edbc7085aa15c97a4bb2e5eb65fa149198f981efbdb0df73a84e3f
-
SHA512
1c90e6ebbfbd89dc74c0248510caf72e3795a881a835f881ef2906fc7dd7223e79dac6dc900c4b98d93d9cb53681c2a8c360e6465dd4ac38c8bdabdbef7ddba0
Malware Config
Extracted
raccoon
42069a99036f7acbe85c9bc67fe3207cd01fb3fc
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Raccoon Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3220-131-0x0000000000ED0000-0x0000000000F60000-memory.dmp family_raccoon behavioral2/memory/3220-132-0x0000000000400000-0x0000000000C57000-memory.dmp family_raccoon