Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-05-2022 01:56

General

  • Target

    ea3a2f4ccb1575a21c790e37aca831bed210b9860eb72dad7879d8bea7b99dd7.exe

  • Size

    527KB

  • MD5

    e0804b5d4735af8595cf296545bb5f01

  • SHA1

    05d5089042faf5a4661b53ad6a3147d7d457820d

  • SHA256

    ea3a2f4ccb1575a21c790e37aca831bed210b9860eb72dad7879d8bea7b99dd7

  • SHA512

    961bcfe8ee675408e896a53252ff6389ca843e75622685cbb75fe55c290f136c4b1724c074cce86883f16c56491facbe6a82afd11dace6db6799a72b202e569b

Malware Config

Extracted

Family

raccoon

Botnet

42069a99036f7acbe85c9bc67fe3207cd01fb3fc

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Raccoon Stealer Payload 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea3a2f4ccb1575a21c790e37aca831bed210b9860eb72dad7879d8bea7b99dd7.exe
    "C:\Users\Admin\AppData\Local\Temp\ea3a2f4ccb1575a21c790e37aca831bed210b9860eb72dad7879d8bea7b99dd7.exe"
    1⤵
      PID:2044

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2044-54-0x00000000002C9000-0x0000000000319000-memory.dmp
      Filesize

      320KB

    • memory/2044-55-0x0000000075841000-0x0000000075843000-memory.dmp
      Filesize

      8KB

    • memory/2044-56-0x00000000002C9000-0x0000000000319000-memory.dmp
      Filesize

      320KB

    • memory/2044-57-0x0000000004E70000-0x0000000004F00000-memory.dmp
      Filesize

      576KB

    • memory/2044-58-0x0000000000400000-0x0000000004DFE000-memory.dmp
      Filesize

      74.0MB