Behavioral task
behavioral1
Sample
2560-2512-0x0000000000400000-0x0000000000445000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2560-2512-0x0000000000400000-0x0000000000445000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
2560-2512-0x0000000000400000-0x0000000000445000-memory.dmp
-
Size
276KB
-
MD5
68df1b5445c124d0c694752e5da7548a
-
SHA1
23a6e440a9bcbb6b3e5143ca8544108179e80e3b
-
SHA256
3a56c01b6789276de02b059b13a1017f30f8b34cc70d700a4764d771640bf084
-
SHA512
543d8eb27626d590cec8d5dc127f8c2703a7a9ccb4daab53f9304015801abeaeda5068de9edf429dd175fc69677c9309f742a8c68234cd90a7d83651beb3f94f
-
SSDEEP
6144:icNf7P/wxlb7BmH09No59hdjhkeCFWO3EMQ:FN7pA6zM
Malware Config
Extracted
raccoon
fc8427198f843d72c1aa8a66db1a98f3
http://193.149.180.192/
Signatures
-
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2560-2512-0x0000000000400000-0x0000000000445000-memory.dmp
Files
-
2560-2512-0x0000000000400000-0x0000000000445000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ