Behavioral task
behavioral1
Sample
1624-168-0x0000000000EC0000-0x000000000165D000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1624-168-0x0000000000EC0000-0x000000000165D000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1624-168-0x0000000000EC0000-0x000000000165D000-memory.dmp
-
Size
7.6MB
-
MD5
e27d1d76335128514b0e479005a1176d
-
SHA1
6284b898eee71d41ee4f64e3ba541c42c4c0ad56
-
SHA256
a6acfe0f9dff6403cf14ffb1ec45bcaab127197ac0682e3cfb384ca20c324b4e
-
SHA512
64c484857e83689706c54cef3d29936b9b443d56c3d7b5fa03a902d444f78cf48fded75ec3b57d1cc5682401af481bca900bdfea67670d832480cda66156dd46
-
SSDEEP
98304:EHkwx/eSCKXuvZJKNgzN/ESsNp6ADE8z9XU64frvRVZsSIC0w:5w4Tuu7KNgh8SC6kXxIpTIY
Malware Config
Extracted
raccoon
1235b3a160961761ce8049994266cca8
http://213.252.244.167/
Signatures
-
Raccoon family
Files
-
1624-168-0x0000000000EC0000-0x000000000165D000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 2.7MB - Virtual size: 7.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE