Behavioral task
behavioral1
Sample
2692-18-0x0000000000400000-0x000000000041B000-memory.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
2692-18-0x0000000000400000-0x000000000041B000-memory.exe
Resource
win10v2004-20231020-en
General
-
Target
2692-18-0x0000000000400000-0x000000000041B000-memory.dmp
-
Size
108KB
-
MD5
1b551d903a672792d8e4d597215e37af
-
SHA1
40d4161777a601c9056a89dd484edacb1288c855
-
SHA256
9a94937cd630e15f14f69f8102c79db402e57c075cd2b9f50d388fe9fded101a
-
SHA512
09a8d39c29390fdbc39334c0fb4f5cc1a8a8076ef0117638792b71cfce674e73269e3947d1b806d09cb96456fe5a7a0f8d3541e2e3b660850b673945b51a0a3a
-
SSDEEP
3072:VANfQKMuflyKX9FBFya6mob2l1L6RJ//5O:60O9FBn6pb+ARJ/
Malware Config
Extracted
raccoon
66abb93700da7ce4fb9f52da912f5cf3
http://45.61.138.198:80/
-
user_agent
SunShineMoonLight
Signatures
-
Raccoon Stealer payload 1 IoCs
resource yara_rule sample family_raccoon -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2692-18-0x0000000000400000-0x000000000041B000-memory.dmp
Files
-
2692-18-0x0000000000400000-0x000000000041B000-memory.dmp.exe windows:6 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE