Behavioral task
behavioral1
Sample
2772-33-0x0000000000400000-0x000000000041D000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2772-33-0x0000000000400000-0x000000000041D000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2772-33-0x0000000000400000-0x000000000041D000-memory.dmp
-
Size
116KB
-
MD5
570f82e6e3dca6b5d4ae6f15562963a5
-
SHA1
d22930dd24c1721781b67d1b0cb5e000d150a149
-
SHA256
1caad3e0d2c43789619e211ed78cb69d470a40b9ae662a0dbf62cbd4efd599ef
-
SHA512
783b600d0540ebf7a5abc284f0d163562dc312ad28830df2915eb7216a14ff4c1888b3671d934a794d1876b0ea23fd839ebed8c79b57a0376465eac8cb82d801
-
SSDEEP
3072:GANfQKMuflyKX9FBFya6mob2lhL6RJ//5O7:Z0O9FBn6pb+kRJ/
Malware Config
Extracted
raccoon
5e2505d8647542f05843f89ae7cd18e7
http://5.75.241.110:80
Signatures
-
Raccoon Stealer payload 1 IoCs
resource yara_rule sample family_raccoon -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2772-33-0x0000000000400000-0x000000000041D000-memory.dmp
Files
-
2772-33-0x0000000000400000-0x000000000041D000-memory.dmp.exe windows:6 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vqwj Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE