Behavioral task
behavioral1
Sample
2196570x00000000004000000.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
2196570x00000000004000000.exe
Resource
win10v2004-20230703-en
General
-
Target
2196570x00000000004000000.dmp
-
Size
456KB
-
MD5
58b181f1cf980b583222f9911f22fc18
-
SHA1
cdc655db0bff3efae31822bd020c86f353b2b47b
-
SHA256
4c381ac58322e5386ee136daa52f80c3cc20bcf4615445439536e052bede80e5
-
SHA512
6c243626d1b8289d812f23f5702f14870c3730df5c15c6725a5da6a561802f7689d8854a4330e3d7eab49567ac9b7ea30884bc7fcdd2f92fe65ab35603f81539
-
SSDEEP
3072:YyaweE2ylZtoK3RsNr/GoKBCEBdfWGUE05TaxSnJscL:Y9MhLZ3eNr/PKwMdfNUxKOC+
Malware Config
Extracted
raccoon
iByteToWideChar
Signatures
-
Raccoon Stealer payload 1 IoCs
Processes:
resource yara_rule sample family_raccoon -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2196570x00000000004000000.dmp
Files
-
2196570x00000000004000000.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE