Behavioral task
behavioral1
Sample
2196-56-0x0000000000400000-0x0000000001B40000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2196-56-0x0000000000400000-0x0000000001B40000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2196-56-0x0000000000400000-0x0000000001B40000-memory.dmp
-
Size
23.2MB
-
MD5
880ff4bea37bc7362676eabd54238942
-
SHA1
73ed708695b4612edaad99aaf108c021219603d3
-
SHA256
81f44271a3f4a3303569a07d74c447ddd8ea1c60bdd2f4ea26cddc36d1bda62a
-
SHA512
c6be1c807444491a66c3c005cf52913f04ed38b208e94075a5fbce16f061d25a0bdb4d8dc63e37647502ade0d7898af95afed6662b8013fb1a642f4a51d6e812
-
SSDEEP
6144:YZ6FhFSvGpDbnD6suIhfQFTlPPpMsTwUA:Y6vFzpH7Ns9t
Malware Config
Extracted
raccoon
3c85f6d12f0866626b35b64056ce8880
http://5.78.98.26:8088/
Signatures
-
Raccoon Stealer payload 1 IoCs
Processes:
resource yara_rule sample family_raccoon -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2196-56-0x0000000000400000-0x0000000001B40000-memory.dmp
Files
-
2196-56-0x0000000000400000-0x0000000001B40000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE