Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-05-2022 21:50
Static task
static1
Behavioral task
behavioral1
Sample
f2551d6506bebf6a9522f1fef7764f483214f8baee5595957dc80472f0b43b05.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f2551d6506bebf6a9522f1fef7764f483214f8baee5595957dc80472f0b43b05.exe
Resource
win10v2004-20220414-en
General
-
Target
f2551d6506bebf6a9522f1fef7764f483214f8baee5595957dc80472f0b43b05.exe
-
Size
482KB
-
MD5
82c49dd2427383d22d1e836e2adfd266
-
SHA1
9800e2b9e792e3f75aa34b65ba9a1f47b4371862
-
SHA256
f2551d6506bebf6a9522f1fef7764f483214f8baee5595957dc80472f0b43b05
-
SHA512
667832b086a226e09fce07d8c24cdff287a88821a7b026490ba27db5db1f90f3aa3af7d97ad76fb6ddd707fa294373c75366ae55ecaa3a8325f72af3fca4912a
Malware Config
Extracted
raccoon
ef5c4ae6eecb3be16c1e2f8bfa015718d26593aa
-
url4cnc
https://telete.in/jdiamond13
Signatures
-
Raccoon Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1068-57-0x0000000000310000-0x00000000003A0000-memory.dmp family_raccoon behavioral1/memory/1068-58-0x0000000000400000-0x00000000009C9000-memory.dmp family_raccoon
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1068-54-0x0000000000AC9000-0x0000000000B19000-memory.dmpFilesize
320KB
-
memory/1068-55-0x0000000075C51000-0x0000000075C53000-memory.dmpFilesize
8KB
-
memory/1068-57-0x0000000000310000-0x00000000003A0000-memory.dmpFilesize
576KB
-
memory/1068-56-0x0000000000AC9000-0x0000000000B19000-memory.dmpFilesize
320KB
-
memory/1068-58-0x0000000000400000-0x00000000009C9000-memory.dmpFilesize
5.8MB