Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp
-
Size
57KB
-
MD5
c8e8803848918c12275bd7658db00041
-
SHA1
c9e049b334bc504bff286379d4c00eb8e7c270ed
-
SHA256
bac760f4bbbee93e63a78bcaebf56448d2e1217bcb5b61db51ce44d3aac5cf6a
-
SHA512
b6cd612545fdb68d069a1257935ca67230bfadf95af63b484bc927ff9221ef24325c6d21604ac77da918046d68dc5cddf6acabdd6a5d8dbe0ff2a6dba5736c76
-
SSDEEP
768:8qOKi+7erib7i6DcJKUU1HTbqHymKYGkHrYb1sIz1Mi0MTGVq123VEcBehZVDBlH:jky1EMd1KEWexDDRcpdUooIdYfN8E
Malware Config
Extracted
raccoon
c7ede4e1d38311f89345e94d76fa9d65
http://45.15.156.11/
Signatures
-
Raccoon family
Files
-
tmp.exe windows x86
94482195a14b2f0ff3fd77f07609274d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryW
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ