Analysis

  • max time kernel
    150s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    09-05-2022 00:32

General

  • Target

    2781194475512243ce53ba7e199feb37177d53d86d3bfd7e6c7bcf09615de054.exe

  • Size

    1.7MB

  • MD5

    0aee5bc4546c00a82527d67466bff212

  • SHA1

    da270080938fe4cb8526c2e83b7ada917bdbeba1

  • SHA256

    2781194475512243ce53ba7e199feb37177d53d86d3bfd7e6c7bcf09615de054

  • SHA512

    e5b675049c7218a4c1d2da12c52f0a7f8afdb15d34649fea2decce8436362cc5522ee9179e96c60118430f845968e9891042d0ae6cf837e245bd5c5bb391f783

Malware Config

Extracted

Family

raccoon

Botnet

3be206631875bdcb90e5257a9e8f4c579b93a44c

Attributes
  • url4cnc

    https://telete.in/jmoscowneversleeeeps111

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • Raccoon Stealer Payload 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2781194475512243ce53ba7e199feb37177d53d86d3bfd7e6c7bcf09615de054.exe
    "C:\Users\Admin\AppData\Local\Temp\2781194475512243ce53ba7e199feb37177d53d86d3bfd7e6c7bcf09615de054.exe"
    1⤵
      PID:3452

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3452-130-0x0000000002300000-0x0000000002391000-memory.dmp
      Filesize

      580KB

    • memory/3452-131-0x0000000000400000-0x00000000005AE000-memory.dmp
      Filesize

      1.7MB