Behavioral task
behavioral1
Sample
1960-54-0x0000000000100000-0x0000000000A79000-memory.exe
Resource
win7-20220901-en
General
-
Target
1960-54-0x0000000000100000-0x0000000000A79000-memory.dmp
-
Size
9.5MB
-
MD5
30e03d9fdc906556cfbb450d822c2f5c
-
SHA1
f18450181f6514c636325bc1a4cb79c954994a98
-
SHA256
dfee69b0a6a2fa2443d2f46d29050b55e205f45e0432a9633b45351a7042e608
-
SHA512
f1ff870134dd8bd7d6d51cc1e47c03415f6481a4e3f6b509f9a801252c46c12531b8d78da93a36c62ac65953e7fba7a6c556b3aa8b7ef4d54a740a5934ffa2ea
-
SSDEEP
24576:RqB+W/AbI/SF0jXRcQrVKQAEDb6vTqMduzS+QPyWn7Fi3lkpS1RkfOuP/:JGXwbJTzuhZWn7Fi3yW
Malware Config
Signatures
-
Raccoon family
Files
-
1960-54-0x0000000000100000-0x0000000000A79000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 18KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 194KB - Virtual size: 7.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE