Behavioral task
behavioral1
Sample
1824-104-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1824-104-0x0000000000400000-0x000000000041C000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
1824-104-0x0000000000400000-0x000000000041C000-memory.dmp
-
Size
112KB
-
MD5
8b9e1e4a3e8492997d4b019cf21749a2
-
SHA1
84af6d37f51e0b25b6e6986ed29e37f56a5d7adb
-
SHA256
2752d53d461f9fed8cf7aa64bb6c9b47d979fe4a638e115a57081cbef5823d35
-
SHA512
e7d005f5e9194c07a8f266228699c4eb2a0565f875a6aef2ad730c104b314bcc26f71f9550ca4f30c46a425787e259acfc6577765b40ba2ba5fdefa3006687c2
-
SSDEEP
3072:oEfIr0usN5rtB+U7ITo+StwTEAFDYpcOttnt3:oyttI0PtJI+nt3
Malware Config
Extracted
raccoon
4fd5203c1fc4dac79a7960272b609592
http://5.206.224.46:80
-
user_agent
GeekingToTheMoon
Signatures
-
Raccoon Stealer payload 1 IoCs
resource yara_rule sample family_raccoon -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1824-104-0x0000000000400000-0x000000000041C000-memory.dmp
Files
-
1824-104-0x0000000000400000-0x000000000041C000-memory.dmp.exe windows:6 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xekt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE