Behavioral task
behavioral1
Sample
2496-56-0x0000000000400000-0x0000000002421000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2496-56-0x0000000000400000-0x0000000002421000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
2496-56-0x0000000000400000-0x0000000002421000-memory.dmp
-
Size
32.1MB
-
MD5
371cb4e5d4531271ffe713bb63635e8c
-
SHA1
6cd8a5c3b2e6f5a93e631f9a31323a547173caf2
-
SHA256
9bfd5ef90b030ab4ad7c396a348f4d4df277c4e8896d92b0d1f5c6472644ef6f
-
SHA512
92a83ae64633997bf03660285a8e3ffa305fc39ed0cc5206918c44374748e1c6159ac65f1eea8596a576605c44c85dc68467a01762f5d5505885c2c7c22831ce
-
SSDEEP
3072:Yyy7f7Fdry+yonVxcvx3pq+HCcm6yetmU59STvCzS0Jkue:Yh7fHm+r4x3pt3mde4Qg2SL
Malware Config
Extracted
raccoon
20f4a91c61f63af35df3e278591a8e70
http://5.161.69.57:8088/
Signatures
-
Raccoon Stealer payload 1 IoCs
resource yara_rule sample family_raccoon -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2496-56-0x0000000000400000-0x0000000002421000-memory.dmp
Files
-
2496-56-0x0000000000400000-0x0000000002421000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE