Behavioral task
behavioral1
Sample
600-55-0x0000000000840000-0x0000000000F97000-memory.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
600-55-0x0000000000840000-0x0000000000F97000-memory.exe
Resource
win10v2004-20220721-en
General
-
Target
600-55-0x0000000000840000-0x0000000000F97000-memory.dmp
-
Size
7.3MB
-
MD5
de5b23b649e2bbf037e971a775d6b9e0
-
SHA1
17715f600de366de53f68999d0ae8341e43ca82c
-
SHA256
48fe375476f91281f4ce711375d7076b34690802e72ccdae9ba39ff4f3c2813a
-
SHA512
8e8211cb80c25f551d22f23d93c880d4624a159ccecf7c61cf2277acd4426dc2783b2be40859e1e3b17fdbc48a1f4f017e71367e50fc020155a0b9a268c989e9
-
SSDEEP
196608:vYUCaE2K6u7cVr8JLYO+T/rsIMOWlpmjQTsWGZr:vPE2fuQV4JLYOQsIMOWlAQFG
Malware Config
Extracted
raccoon
517bb0d640c1242c3f069aab3d1018d6
http://51.195.166.178/
Signatures
-
Raccoon Stealer payload 1 IoCs
Processes:
resource yara_rule sample family_raccoon -
Raccoon family
Files
-
600-55-0x0000000000840000-0x0000000000F97000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.2vB Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.a|D Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.=xC Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ