Behavioral task
behavioral1
Sample
2820-57-0x0000000000400000-0x00000000004E3000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2820-57-0x0000000000400000-0x00000000004E3000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2820-57-0x0000000000400000-0x00000000004E3000-memory.dmp
-
Size
908KB
-
MD5
98bdc21e05136a02680b677398f19a19
-
SHA1
99b93ab6cfcb0eae319bdcc17f936d7f8a454b25
-
SHA256
05626d99ab1e1aa7969f92a3a4fe88339c0354125ff5be1a2906f969169511ac
-
SHA512
ee145bdc8ff4f031f45d378cfaa8eaedf7db9b419f0353474624dfaa069ff6cef0db787c954df56ec588533b923b54fdd0b2b7f1fe89398e8fa4fdc6a1fa59b8
-
SSDEEP
1536:T2t4cybq56O44Wi7Z2DYEXjgJRpHLuPNqKzYs4TyL/fQr8DAzRZ+IHm5L+Cf1z3:YyoWPYETgjpreNbYs4TaB4RZI5LT
Malware Config
Extracted
raccoon
6e489b600db6a7cfd6a1b65b9a5a61eb
http://5.78.111.161:8088/
Signatures
-
Raccoon Stealer payload 1 IoCs
Processes:
resource yara_rule sample family_raccoon -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2820-57-0x0000000000400000-0x00000000004E3000-memory.dmp
Files
-
2820-57-0x0000000000400000-0x00000000004E3000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE