Analysis
-
max time kernel
146s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-07-2022 06:21
Static task
static1
Behavioral task
behavioral1
Sample
c29a42ae9f3a44e8b7358e9b8fcd46e5.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c29a42ae9f3a44e8b7358e9b8fcd46e5.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
c29a42ae9f3a44e8b7358e9b8fcd46e5.exe
-
Size
6.9MB
-
MD5
c29a42ae9f3a44e8b7358e9b8fcd46e5
-
SHA1
cf15043518df3306562dee1fa5fb3eb4bb1a06e4
-
SHA256
08ff05c7d5ea1a8b4af9d40deec84d56b178c043e38613081722963667f0a181
-
SHA512
34ae6ec1618410f093940bf03312846110f51cfb0a33e5c2c6555b3710cef145b2a6936e3d4fb9d1b4651d1442b6667bf4d8f8dec058763d396f5913e8b1071c
Score
10/10
Malware Config
Extracted
Family
raccoon
Botnet
6f692affee3c8a5176ffa56f904dcc3e
C2
http://51.195.166.175/
rc4.plain
Signatures
-
Raccoon Stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4924-130-0x0000000000A60000-0x000000000152B000-memory.dmp family_raccoon behavioral2/memory/4924-132-0x0000000000A60000-0x000000000152B000-memory.dmp family_raccoon behavioral2/memory/4924-133-0x0000000000A60000-0x000000000152B000-memory.dmp family_raccoon behavioral2/memory/4924-134-0x0000000000A60000-0x000000000152B000-memory.dmp family_raccoon -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4924 c29a42ae9f3a44e8b7358e9b8fcd46e5.exe 4924 c29a42ae9f3a44e8b7358e9b8fcd46e5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4924 c29a42ae9f3a44e8b7358e9b8fcd46e5.exe 4924 c29a42ae9f3a44e8b7358e9b8fcd46e5.exe