Behavioral task
behavioral1
Sample
100840-332-0x0000000000400000-0x0000000000414000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
100840-332-0x0000000000400000-0x0000000000414000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
100840-332-0x0000000000400000-0x0000000000414000-memory.dmp
-
Size
80KB
-
MD5
7a2e5f9169b6863d200de2cbc4c9f99c
-
SHA1
e9d1af7654890c98ec4eaad5bf3d1fea7acfba5b
-
SHA256
ca5368df1a3bb947cf8ac83664b05f48508ccc3edd2c611cffc842660d7802b2
-
SHA512
5827a5ae50335adce3580ec30eb1b1afd1f6987da4310fae6ea66d1ee53b5d794f6e73ee955fd17c3926c18a6329c5f8c22053563c5d078dc98441f840e790fd
-
SSDEEP
768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6RX5UhS:AdMzAzjavO9uG+NNdQ4MGQRXG
Malware Config
Extracted
raccoon
45e326db2f0dcd074fdd0d3db7fe304a
http://45.15.156.27
Signatures
-
Raccoon family
Files
-
100840-332-0x0000000000400000-0x0000000000414000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ