Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-05-2023 08:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Game.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Game.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
Game.exe
-
Size
14.3MB
-
MD5
63e1c02328e164708ea0c18d743eb8b4
-
SHA1
3eef6dd42cf4a3a88fdcf7f99000141111e04efc
-
SHA256
e7d8efc068eea96b48c4ec54adbf5c5cba3d3fa3e53762c7c4f8d2c52de29d3e
-
SHA512
89d0d07ebaef0e6eb85b47f35ffc1ca503fbe606d5b3efbde023b7b5b022f1d0843675ab85be385258bb53feefb26d2d6171475fe36656818965d59fa3f4ea8a
-
SSDEEP
393216:fJCmQN9sbqyNvHWSV2Sv2ijuRBV1Iw8J:smbqyN/WS1AN1vO
Score
10/10
Malware Config
Extracted
Family
raccoon
Botnet
55ea4e819c21475b86eb69f9ed8b0a36
C2
http://37.220.87.86/
http://77.73.134.43/
http://94.142.138.125/
http://94.142.138.126/
xor.plain
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/324-55-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/324-54-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/324-56-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/324-57-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/324-58-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/324-59-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/324-60-0x0000000000400000-0x0000000001DFD000-memory.dmpFilesize
26.0MB