Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 01:56
Static task
static1
Behavioral task
behavioral1
Sample
ea3a2f4ccb1575a21c790e37aca831bed210b9860eb72dad7879d8bea7b99dd7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ea3a2f4ccb1575a21c790e37aca831bed210b9860eb72dad7879d8bea7b99dd7.exe
Resource
win10v2004-20220414-en
General
-
Target
ea3a2f4ccb1575a21c790e37aca831bed210b9860eb72dad7879d8bea7b99dd7.exe
-
Size
527KB
-
MD5
e0804b5d4735af8595cf296545bb5f01
-
SHA1
05d5089042faf5a4661b53ad6a3147d7d457820d
-
SHA256
ea3a2f4ccb1575a21c790e37aca831bed210b9860eb72dad7879d8bea7b99dd7
-
SHA512
961bcfe8ee675408e896a53252ff6389ca843e75622685cbb75fe55c290f136c4b1724c074cce86883f16c56491facbe6a82afd11dace6db6799a72b202e569b
Malware Config
Extracted
raccoon
42069a99036f7acbe85c9bc67fe3207cd01fb3fc
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Raccoon Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2044-57-0x0000000004E70000-0x0000000004F00000-memory.dmp family_raccoon behavioral1/memory/2044-58-0x0000000000400000-0x0000000004DFE000-memory.dmp family_raccoon
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2044-54-0x00000000002C9000-0x0000000000319000-memory.dmpFilesize
320KB
-
memory/2044-55-0x0000000075841000-0x0000000075843000-memory.dmpFilesize
8KB
-
memory/2044-56-0x00000000002C9000-0x0000000000319000-memory.dmpFilesize
320KB
-
memory/2044-57-0x0000000004E70000-0x0000000004F00000-memory.dmpFilesize
576KB
-
memory/2044-58-0x0000000000400000-0x0000000004DFE000-memory.dmpFilesize
74.0MB