Behavioral task
behavioral1
Sample
3800-379-0x0000000000400000-0x000000000041D000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3800-379-0x0000000000400000-0x000000000041D000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
3800-379-0x0000000000400000-0x000000000041D000-memory.dmp
-
Size
116KB
-
MD5
1dad6555c22fecdfbfd920b20db5875c
-
SHA1
b600a18eb00e461f7fadbe21613646f4e41b9f2f
-
SHA256
91acc4f9ca0e2fb0835ed1202067c7143a013aea5bc9e5b18dc81a4e5d59fca0
-
SHA512
39dd39e6aa9d6e796c141d4c0224770a0981983c1b1edd7cd115712fc8e21c41d75406c6093db42de47c5bb10def4a307117b5ff9aefe3f108c4cb6c1872ff74
-
SSDEEP
3072:eANfQKMuflyKX9FBFya6mob2l2L6RJ//5O:h0O9FBn6pb+BRJ/
Malware Config
Extracted
raccoon
5e2505d8647542f05843f89ae7cd18e7
http://128.140.101.125:80/
-
user_agent
SunShineMoonLight
Signatures
-
Raccoon Stealer payload 1 IoCs
resource yara_rule sample family_raccoon -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3800-379-0x0000000000400000-0x000000000041D000-memory.dmp
Files
-
3800-379-0x0000000000400000-0x000000000041D000-memory.dmp.exe windows:6 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdt Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE