Behavioral task
behavioral1
Sample
1260-58-0x0000000000400000-0x000000000047D000-memory.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
1260-58-0x0000000000400000-0x000000000047D000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
1260-58-0x0000000000400000-0x000000000047D000-memory.dmp
-
Size
500KB
-
MD5
21e65f3fc580a9dd1b601af5d6d6a204
-
SHA1
a4206c4dffd9c3444a81fd2a8235ab78ee3ed82e
-
SHA256
f4ba8eaa551f463220c11e4ea20c353147b2963585770976027eba4828352f7e
-
SHA512
31e03b0ed9c42c901a07e5e90beee23f77aa1a7d3a25bc7e0e049c997d4cf2da149d53398477454f22a0199fdcfb7b5288aaaa4f14085b2c8e94503f27d2cc12
-
SSDEEP
3072:YyDoxp7j5TqTZ7rAhgAWCb9j2ig8A4exWkmdCV3/HF:Y4S7jF6ZHAlWe2P8A4Wt3PF
Malware Config
Extracted
raccoon
6bb5fbdb7121bc7ea628330bef79c129
http://5.78.78.150:8088/
Signatures
-
Raccoon Stealer payload 1 IoCs
resource yara_rule sample family_raccoon -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1260-58-0x0000000000400000-0x000000000047D000-memory.dmp
Files
-
1260-58-0x0000000000400000-0x000000000047D000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE