Behavioral task
behavioral1
Sample
468-64-0x0000000000400000-0x000000000041E000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
468-64-0x0000000000400000-0x000000000041E000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
468-64-0x0000000000400000-0x000000000041E000-memory.dmp
-
Size
120KB
-
MD5
bc494806ab0bb7fd4cb0a6c5354c1399
-
SHA1
3ee11fdf0fdd276dc5234d2fce8be4f3010d0119
-
SHA256
65f1daff150018aadc6889fb2fb5e146dde94d1c1e3d18bba5ea35ca640bb989
-
SHA512
1775a0fe466f1cd68953fc00172e2ecd0f39852bdab3a2a6c4ebf4bb6ee57f2c3e32bff88ad8231423f29a1e0a8ef2dbb322132cd4b8997d3c401d6f5b275668
-
SSDEEP
1536:d0jcjzCB6WeKjhKY/hINnAsmLps3K6iAGuSayJCPieRMRGpq5D:QcjzCB6WfhK4IULps3K6RbSlCPiSE75
Malware Config
Extracted
raccoon
79baa49d7baf0a462ea77cc305c9dc65
http://78.47.92.58/
Signatures
-
Raccoon family
Files
-
468-64-0x0000000000400000-0x000000000041E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ