Behavioral task
behavioral1
Sample
1700-2-0x0000000000400000-0x0000000002287000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1700-2-0x0000000000400000-0x0000000002287000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
1700-2-0x0000000000400000-0x0000000002287000-memory.dmp
-
Size
30.5MB
-
MD5
85d3dae139dd7f16548bacc54ed0a2b5
-
SHA1
eca210c5bd1fff45fc971f757969560f59dc81ef
-
SHA256
69f6af4c67bb042ae607124491e4558ad5d170f7aea766707d2f8f3ba297af14
-
SHA512
fc34bb08758e3e5d32de47d832460a5cff5442360242bf678179ea41f2a0f14a5e1e1aa7cf143d2d89f0627c0b127a9c3d81708a456582c8897bd18f4ccf26e6
-
SSDEEP
3072:VANfQKMuflyKX9FBFya6mobSlqL6RJ//5Ok69zlmBMQn/a4:60O9FBn6pbCtRJ/J69zlM
Malware Config
Extracted
raccoon
cf94c33cd30592e5c05e75b8544f18ac
http://93.185.166.154:80/
-
user_agent
SunShineMoonLight
Signatures
-
Raccoon Stealer payload 1 IoCs
resource yara_rule sample family_raccoon -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1700-2-0x0000000000400000-0x0000000002287000-memory.dmp
Files
-
1700-2-0x0000000000400000-0x0000000002287000-memory.dmp.exe windows:6 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE