Behavioral task
behavioral1
Sample
696-168-0x0000000000710000-0x0000000000EAD000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
696-168-0x0000000000710000-0x0000000000EAD000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
696-168-0x0000000000710000-0x0000000000EAD000-memory.dmp
-
Size
7.6MB
-
MD5
6654cf7acc74b152bf8d2c53e648aa58
-
SHA1
12422170c3c925d2f3d20e63e1d8d5b33395a75c
-
SHA256
153eb7afb63001623c924aabccd8c1134af722d652af732d38984b95beab6e36
-
SHA512
056a05a46a888f1769e2e0c40572359c3d4e30d1f24cb268f60a746988c7ca9b905c4b3a65403c565b32986a79ba176594c5b243d2e697989d1a3915d8b15905
-
SSDEEP
98304:kFHkNx/nSCKXIvlJKAogzN/ESRNp6ADE8z9XU64frvRVZsSIC2w:kaN1TuIXKDgh8Sl6kXxIpTIe
Malware Config
Extracted
raccoon
1235b3a160961761ce8049994266cca8
http://213.252.244.167/
Signatures
-
Raccoon family
Files
-
696-168-0x0000000000710000-0x0000000000EAD000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 2.7MB - Virtual size: 7.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE