Behavioral task
behavioral1
Sample
1648-103-0x0000000000A30000-0x00000000011DF000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1648-103-0x0000000000A30000-0x00000000011DF000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
1648-103-0x0000000000A30000-0x00000000011DF000-memory.dmp
-
Size
7.7MB
-
MD5
fbd8128450e0d70887601ce249bdc3ed
-
SHA1
4a4c0276120b2c72e924977a1ff68a6899a41a21
-
SHA256
6840583b926e0fea7c09f243121d65b07514dd714a79e0c6c510c710fd283f87
-
SHA512
f19fc286422d3fc2b4583ba64d4528206fa970b0d0716bc703fc3b3cc52522da64b31f69899f3795ac869b63478f7fd2cbb777faae170eaf04369a7c11355271
-
SSDEEP
98304:GNSRQX9j687ycklr55CQgJrQXnwElVaIWx4sCvu3S7e:GqlrLzX1KVx4s2u3p
Malware Config
Extracted
raccoon
3eb898957657df9f0625e29daa9c1704
http://89.185.85.53/
Signatures
-
Raccoon family
Files
-
1648-103-0x0000000000A30000-0x00000000011DF000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 2.5MB - Virtual size: 7.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE