Analysis

  • max time kernel
    277s
  • max time network
    280s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 22:21

General

  • Target

    3df88f2029a31f78dd274a199c37a0295aeed62e8dbe3b111e5e078058e97e08.exe

  • Size

    608KB

  • MD5

    5f91d60e117449a2059bcbaa577a8ce4

  • SHA1

    ccca241fb8fcf7f56e5ed118cb0db87373681024

  • SHA256

    3df88f2029a31f78dd274a199c37a0295aeed62e8dbe3b111e5e078058e97e08

  • SHA512

    8b5fe5e3692cff0f0a8e9e6f0663c598136353de9e87c8fd764da8e31693017340073dd100bf397e8208790955fbce24a65236e45f6b64070c0168e734fa15c2

  • SSDEEP

    12288:U7hEmjpxH7rbl+6ji1aFDfPY9O2KCJcxeoo53Sc:IpTnJ+6cWDuqst

Malware Config

Extracted

Family

raccoon

Botnet

afb5c633c4650f69312baef49db9dfa4

C2

http://77.73.132.74

rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3df88f2029a31f78dd274a199c37a0295aeed62e8dbe3b111e5e078058e97e08.exe
    "C:\Users\Admin\AppData\Local\Temp\3df88f2029a31f78dd274a199c37a0295aeed62e8dbe3b111e5e078058e97e08.exe"
    1⤵
      PID:1456

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1456-132-0x0000000003010000-0x0000000003026000-memory.dmp

            Filesize

            88KB

          • memory/1456-133-0x0000000000400000-0x000000000049E000-memory.dmp

            Filesize

            632KB