Analysis

  • max time kernel
    69s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-05-2022 16:43

General

  • Target

    test9.exe

  • Size

    552KB

  • MD5

    6b2a1bdeb277bbec7ca7b450787dd2ee

  • SHA1

    62d8acc30d74066aa4e2bd7c30bfa99ad1b4574c

  • SHA256

    fd7b01818107ade3811fe5070491ef2a4bb208ca68bb07710f5c540e44a1e97b

  • SHA512

    cc32e883b9a10d8e774ebec3affeacca7bff573061043d2ef74d638d24977646e3ff3580ddd587e8c6739b2d9b5de0532917e39cc1a20ba2a7c8c3141edcb8af

Malware Config

Extracted

Family

raccoon

Botnet

4a4c4acb62708e2b8f51583787f979bb17da6731

Attributes
  • url4cnc

    http://185.163.204.81/sendmenuw

    http://194.180.191.33/sendmenuw

    http://174.138.11.98/sendmenuw

    http://194.180.191.44/sendmenuw

    http://91.219.236.120/sheinl

    https://t.me/sendmenuw

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

Processes

  • C:\Users\Admin\AppData\Local\Temp\test9.exe
    "C:\Users\Admin\AppData\Local\Temp\test9.exe"
    1⤵
      PID:1468

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1468-54-0x0000000076721000-0x0000000076723000-memory.dmp
      Filesize

      8KB

    • memory/1468-56-0x00000000004C0000-0x0000000000552000-memory.dmp
      Filesize

      584KB

    • memory/1468-55-0x000000000061D000-0x000000000066E000-memory.dmp
      Filesize

      324KB

    • memory/1468-57-0x0000000000400000-0x00000000004B5000-memory.dmp
      Filesize

      724KB