Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2023 12:56
Behavioral task
behavioral1
Sample
Setup_x32_x64.exe
Resource
win7-20230712-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Setup_x32_x64.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Setup_x32_x64.exe
-
Size
992.0MB
-
MD5
aa87368fd85c71caebb069bbd711b5ba
-
SHA1
2c2390bb8cff65b843a682cdb613909cc5fc3579
-
SHA256
1f88c89c82edcde05886262f770bd3df3af0049924d7e290cdc3ab6586503e0a
-
SHA512
4d99c8857d50729e1e99a0f477f5950deff6c11a820095ce765946100b0a0ee58a4fe483589459fba9c5683b79a8f8946879b2cf33eb79fa0a1b486bd64210ca
-
SSDEEP
196608:gpKYW15rR/FityRl28WklfrrN+tBaa/bK0a99R:g0YsTUcP27SfctBV+089R
Malware Config
Extracted
Family
raccoon
Botnet
94c54520400750937a6f1bf6044f8667
C2
http://185.181.10.208/
xor.plain
Signatures
-
Raccoon Stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1328-133-0x0000000000400000-0x0000000000DC1000-memory.dmp family_raccoon behavioral2/memory/1328-142-0x0000000000400000-0x0000000000DC1000-memory.dmp family_raccoon behavioral2/memory/1328-144-0x0000000000400000-0x0000000000DC1000-memory.dmp family_raccoon behavioral2/memory/1328-145-0x0000000000400000-0x0000000000DC1000-memory.dmp family_raccoon -
Processes:
resource yara_rule behavioral2/memory/1328-133-0x0000000000400000-0x0000000000DC1000-memory.dmp vmprotect behavioral2/memory/1328-142-0x0000000000400000-0x0000000000DC1000-memory.dmp vmprotect behavioral2/memory/1328-144-0x0000000000400000-0x0000000000DC1000-memory.dmp vmprotect behavioral2/memory/1328-145-0x0000000000400000-0x0000000000DC1000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup_x32_x64.exepid process 1328 Setup_x32_x64.exe 1328 Setup_x32_x64.exe 1328 Setup_x32_x64.exe 1328 Setup_x32_x64.exe