Analysis
-
max time kernel
148s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 09:01
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
setup.exe
-
Size
992.0MB
-
MD5
839927958c92d3f6f9b743fc8d3d10ac
-
SHA1
d78c545063e2344e52ef2156240f4bad5f0b7233
-
SHA256
bd1620b81553251856f5e2055d9e9fc1354b3917c26ee2a1ba36ff072650da46
-
SHA512
497419dec1a7e94ebb31491524f0191cbf512cb21384f6e406cd060d1042f4ffb9da5715a40d371355bc3bbebb46a707136082d04cc971399ce7eecec2449d53
-
SSDEEP
196608:dHmujQkv58sSw5u1CFwau9R4Rh9dK5A93UKX:dHjYk5/PusZSA93t
Malware Config
Extracted
Family
raccoon
Botnet
13718a923845c0cdab8ce45c585b8d63
C2
http://94.142.138.175/
xor.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3892-140-0x0000000000400000-0x0000000000DC2000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
setup.exepid process 3892 setup.exe 3892 setup.exe 3892 setup.exe 3892 setup.exe