Resubmissions

13-06-2023 13:21

230613-ql4w2agc84 3

13-06-2023 09:01

230613-kyvagafe94 10

Analysis

  • max time kernel
    148s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2023 09:01

General

  • Target

    setup.exe

  • Size

    992.0MB

  • MD5

    839927958c92d3f6f9b743fc8d3d10ac

  • SHA1

    d78c545063e2344e52ef2156240f4bad5f0b7233

  • SHA256

    bd1620b81553251856f5e2055d9e9fc1354b3917c26ee2a1ba36ff072650da46

  • SHA512

    497419dec1a7e94ebb31491524f0191cbf512cb21384f6e406cd060d1042f4ffb9da5715a40d371355bc3bbebb46a707136082d04cc971399ce7eecec2449d53

  • SSDEEP

    196608:dHmujQkv58sSw5u1CFwau9R4Rh9dK5A93UKX:dHjYk5/PusZSA93t

Malware Config

Extracted

Family

raccoon

Botnet

13718a923845c0cdab8ce45c585b8d63

C2

http://94.142.138.175/

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3892

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3892-133-0x0000000000EA0000-0x0000000000EA1000-memory.dmp

    Filesize

    4KB

  • memory/3892-134-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

    Filesize

    4KB

  • memory/3892-135-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/3892-136-0x0000000000F80000-0x0000000000F81000-memory.dmp

    Filesize

    4KB

  • memory/3892-137-0x0000000000F90000-0x0000000000F91000-memory.dmp

    Filesize

    4KB

  • memory/3892-138-0x0000000000FA0000-0x0000000000FA1000-memory.dmp

    Filesize

    4KB

  • memory/3892-139-0x0000000000FB0000-0x0000000000FB1000-memory.dmp

    Filesize

    4KB

  • memory/3892-140-0x0000000000400000-0x0000000000DC2000-memory.dmp

    Filesize

    9.8MB