Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 00:58
Static task
static1
Behavioral task
behavioral1
Sample
159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010_JC.exe
-
Size
238KB
-
MD5
8e16f708713d59a7764c78dc59b9b12a
-
SHA1
ca33ab8943ae25fee116aed6e9b154e0e52035f7
-
SHA256
159ec0b1b8fca14c3b5e20dd42d3ef37fb77cf2818e008e7694aa003a5702010
-
SHA512
055ffac712cb90d17d85c77b32b6b3a229a046cd5f63af546257b45142731045fddb0fffb9e0dabe77ec8519735fa6f0bba876f701e5f8f8280a0b529d7714c6
-
SSDEEP
3072:bffu0FebfDTUilVw9WXgtjXGNgC9vGKo4Ek6miS5vfXTzj:D3eTUwO9WXobGNgAGn4EzwfXT
Malware Config
Extracted
raccoon
0da2e3700aa6f05465fdfc323d371488
http://94.142.138.19:80
-
user_agent
GeekingToTheMoon
Signatures
-
Raccoon Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/1604-1-0x0000000000240000-0x000000000025A000-memory.dmp family_raccoon behavioral1/memory/1604-2-0x0000000000400000-0x00000000004ED000-memory.dmp family_raccoon behavioral1/memory/1604-3-0x0000000000400000-0x00000000004ED000-memory.dmp family_raccoon behavioral1/memory/1604-5-0x0000000000240000-0x000000000025A000-memory.dmp family_raccoon