Analysis
-
max time kernel
303s -
max time network
308s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21/06/2022, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
494df1513b13c70b1472282b80bdf1a9399ae0d16a90275a5c9fe7cfda6afd0d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
494df1513b13c70b1472282b80bdf1a9399ae0d16a90275a5c9fe7cfda6afd0d.exe
Resource
win10-20220414-en
General
-
Target
494df1513b13c70b1472282b80bdf1a9399ae0d16a90275a5c9fe7cfda6afd0d.exe
-
Size
7.5MB
-
MD5
54e884a1b12fec5e6beaa3a3fc431bee
-
SHA1
e7f866afe8e34c722f8dbc5057e47856e37fa0ff
-
SHA256
494df1513b13c70b1472282b80bdf1a9399ae0d16a90275a5c9fe7cfda6afd0d
-
SHA512
863de15037dd1ef165387c3f8a7aaa4526aba11e2fbc4ef1e15c3b2f7c768ca154c35724b5ab5e8ad6a37e30959d19cb09e7d0a63fc9f78f730a00a79307c702
Malware Config
Signatures
-
Raccoon ver2 3 IoCs
Raccoon ver2.
resource yara_rule behavioral2/memory/2264-138-0x0000000000FB0000-0x0000000001737000-memory.dmp raccoon_v2 behavioral2/memory/2264-154-0x0000000000FB0000-0x0000000001737000-memory.dmp raccoon_v2 behavioral2/memory/2264-167-0x0000000000FB0000-0x0000000001737000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2264 494df1513b13c70b1472282b80bdf1a9399ae0d16a90275a5c9fe7cfda6afd0d.exe 2264 494df1513b13c70b1472282b80bdf1a9399ae0d16a90275a5c9fe7cfda6afd0d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2264 494df1513b13c70b1472282b80bdf1a9399ae0d16a90275a5c9fe7cfda6afd0d.exe 2264 494df1513b13c70b1472282b80bdf1a9399ae0d16a90275a5c9fe7cfda6afd0d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\494df1513b13c70b1472282b80bdf1a9399ae0d16a90275a5c9fe7cfda6afd0d.exe"C:\Users\Admin\AppData\Local\Temp\494df1513b13c70b1472282b80bdf1a9399ae0d16a90275a5c9fe7cfda6afd0d.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2264