Analysis
-
max time kernel
150s -
max time network
202s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-05-2022 12:00
Static task
static1
Behavioral task
behavioral1
Sample
f838af1b47541fd2fabba97dc00b9014776f4d2f04a709d56d1f3fbe38588b23.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f838af1b47541fd2fabba97dc00b9014776f4d2f04a709d56d1f3fbe38588b23.exe
Resource
win10v2004-20220414-en
General
-
Target
f838af1b47541fd2fabba97dc00b9014776f4d2f04a709d56d1f3fbe38588b23.exe
-
Size
485KB
-
MD5
27cec817124201e08ee60d926bea66ef
-
SHA1
427111ee74090bbd8a2b86ddd29c740a0a94499b
-
SHA256
f838af1b47541fd2fabba97dc00b9014776f4d2f04a709d56d1f3fbe38588b23
-
SHA512
59dd4dc14e298dc4e9074fcbc61d3a4d2270d4e4b0d68b8c67dc1ea6f4c1b440a6027509544aa797c9499eb021323cd952d468f5e15e794095e9005fdfb2e6da
Malware Config
Extracted
raccoon
6938776b562423d4bb3bb6212e33389ee65fde1c
-
url4cnc
https://telete.in/j_1hannibal
Signatures
-
Raccoon Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1928-56-0x0000000000220000-0x00000000002B1000-memory.dmp family_raccoon behavioral1/memory/1928-57-0x0000000000400000-0x0000000004DF5000-memory.dmp family_raccoon
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1928-54-0x0000000075941000-0x0000000075943000-memory.dmpFilesize
8KB
-
memory/1928-55-0x0000000004F5B000-0x0000000004FAC000-memory.dmpFilesize
324KB
-
memory/1928-56-0x0000000000220000-0x00000000002B1000-memory.dmpFilesize
580KB
-
memory/1928-57-0x0000000000400000-0x0000000004DF5000-memory.dmpFilesize
74.0MB