Analysis
-
max time kernel
277s -
max time network
280s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
3df88f2029a31f78dd274a199c37a0295aeed62e8dbe3b111e5e078058e97e08.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3df88f2029a31f78dd274a199c37a0295aeed62e8dbe3b111e5e078058e97e08.exe
Resource
win10v2004-20220812-en
General
-
Target
3df88f2029a31f78dd274a199c37a0295aeed62e8dbe3b111e5e078058e97e08.exe
-
Size
608KB
-
MD5
5f91d60e117449a2059bcbaa577a8ce4
-
SHA1
ccca241fb8fcf7f56e5ed118cb0db87373681024
-
SHA256
3df88f2029a31f78dd274a199c37a0295aeed62e8dbe3b111e5e078058e97e08
-
SHA512
8b5fe5e3692cff0f0a8e9e6f0663c598136353de9e87c8fd764da8e31693017340073dd100bf397e8208790955fbce24a65236e45f6b64070c0168e734fa15c2
-
SSDEEP
12288:U7hEmjpxH7rbl+6ji1aFDfPY9O2KCJcxeoo53Sc:IpTnJ+6cWDuqst
Malware Config
Extracted
raccoon
afb5c633c4650f69312baef49db9dfa4
http://77.73.132.74
Signatures
-
Raccoon Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/1456-132-0x0000000003010000-0x0000000003026000-memory.dmp family_raccoon behavioral2/memory/1456-133-0x0000000000400000-0x000000000049E000-memory.dmp family_raccoon