Behavioral task
behavioral1
Sample
21660473a805402e4fc4bf796616ed1a_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
21660473a805402e4fc4bf796616ed1a_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
21660473a805402e4fc4bf796616ed1a_JC.exe
-
Size
101KB
-
MD5
21660473a805402e4fc4bf796616ed1a
-
SHA1
f8d086021f1e1edb0705c9630f25c3d038cef19c
-
SHA256
6bac9dbaedb4ac21b79bef837aaea4193df7c4def1faa0697fa67d1de3613330
-
SHA512
19845d558394b1580abc4359422d04f9af97a51c3e3a982bddb30f13e83a31c8ff4fca6fd8df5e4602e97ba3872bf07a59eaf75d8ea629fd783a58be20aedeef
-
SSDEEP
3072:dEfIr0usN5rtB+U7ITo+StATEaFDYpcOpW:dyttI0PtZe3
Malware Config
Extracted
raccoon
c07b3e8c3ea8e955ae196cb4599f6ca7
http://94.103.93.160:80/
-
user_agent
GeekingToTheMoon
Signatures
-
Raccoon Stealer payload 1 IoCs
resource yara_rule sample family_raccoon -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21660473a805402e4fc4bf796616ed1a_JC.exe
Files
-
21660473a805402e4fc4bf796616ed1a_JC.exe.exe windows:6 windows x86
0fcb7632c48018563e5af2f63681ece5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringA
FindClose
CreateMutexA
LocalAlloc
ReleaseMutex
CancelWaitableTimer
GetLastError
SetEvent
LoadLibraryA
ReleaseSemaphore
LoadLibraryW
ResetEvent
CreateWaitableTimerA
GetProcAddress
LocalFree
SetEnvironmentVariableA
CreateFileMappingW
CreateSemaphoreA
CreateEventA
lstrlenA
CloseHandle
FindFirstFileA
advapi32
RegOpenKeyExA
ole32
CoInitialize
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gmns Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE