Analysis
-
max time kernel
40s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
10-06-2022 07:05
Static task
static1
Behavioral task
behavioral1
Sample
ac47ed991025f58745a3ca217b2091e0a54cf2a99ddb0c98988ec7e5de8eac6a.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ac47ed991025f58745a3ca217b2091e0a54cf2a99ddb0c98988ec7e5de8eac6a.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
ac47ed991025f58745a3ca217b2091e0a54cf2a99ddb0c98988ec7e5de8eac6a.exe
Malware Config
Extracted
Family
raccoon
Botnet
4de7dee4071e4b4cae054f82610a593c
C2
http://194.180.174.180/
rc4.plain
rc4.plain
Signatures
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ac47ed991025f58745a3ca217b2091e0a54cf2a99ddb0c98988ec7e5de8eac6a.exepid process 732 ac47ed991025f58745a3ca217b2091e0a54cf2a99ddb0c98988ec7e5de8eac6a.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/732-54-0x0000000001330000-0x0000000001CAC000-memory.dmpFilesize
9.5MB
-
memory/732-56-0x0000000075781000-0x0000000075783000-memory.dmpFilesize
8KB
-
memory/732-57-0x0000000001330000-0x0000000001CAC000-memory.dmpFilesize
9.5MB
-
memory/732-58-0x0000000001330000-0x0000000001CAC000-memory.dmpFilesize
9.5MB