Behavioral task
behavioral1
Sample
992-61-0x0000000000620000-0x0000000000634000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
992-61-0x0000000000620000-0x0000000000634000-memory.exe
Resource
win10v2004-20220901-en
General
-
Target
992-61-0x0000000000620000-0x0000000000634000-memory.dmp
-
Size
80KB
-
MD5
b7e2ae4099c692829bda7998514b0885
-
SHA1
81c70444fb06b19ae3cf2a1e91a739d03773b80b
-
SHA256
c170ea4d36a7e01321c077f062ee5d1d3fc2a5a99ed5ef514bf393b9560c1abb
-
SHA512
3babc623f59e5247dbb96dcf0b3760669b491045202b220644629588f7a90cb38a462294d064b27844ae7b76b5ac9cf993473d4fee38417f13d67863c0873190
-
SSDEEP
1536:JubQK3P3XX3KXDwM9vHEJVIgpjjCbbu6WwWQRG:JzK3P3XX3KXDpFkQgtjCZ
Malware Config
Extracted
raccoon
0b3b2a0f97b4af6132b2cc46c59f74ba
http://194.87.216.7/
Signatures
-
Raccoon family
Files
-
992-61-0x0000000000620000-0x0000000000634000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 45KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 6.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 6.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ