Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2023 16:50

General

  • Target

    8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe

  • Size

    17.1MB

  • MD5

    609aae1b7204c854d660c22179ece445

  • SHA1

    897ac7d1a4583d4a57ee9b6f045e13bcc89b0229

  • SHA256

    8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751

  • SHA512

    5602d7ece0d0ca7e94bc348b3b6284d45dc0cf31982eedd54ea3f5fdc860a00be5a61eb0d4d89410f549fd29b156511085ec16af8a1fc43f0ee2aa5a14f2b9ab

  • SSDEEP

    393216:LymUDdRkuhbXo8u8jMB5yU9sWwOExGTkuRe1jkgIBN1:2m6bdoOjeQUKZ7AIuRe1uBN

Malware Config

Extracted

Family

raccoon

Botnet

d4dfe058bb722373a292317097b425f0

C2

http://37.49.230.54:80

http://37.49.230.152:80

Attributes
  • user_agent

    GeekingToTheMoon

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe
    "C:\Users\Admin\AppData\Local\Temp\8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1716

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1716-0-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1716-3-0x0000000000400000-0x0000000001EE7000-memory.dmp

    Filesize

    26.9MB

  • memory/1716-2-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1716-5-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1716-6-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1716-9-0x0000000000400000-0x0000000001EE7000-memory.dmp

    Filesize

    26.9MB

  • memory/1716-8-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1716-12-0x0000000077B60000-0x0000000077B61000-memory.dmp

    Filesize

    4KB

  • memory/1716-13-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/1716-11-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1716-15-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/1716-17-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/1716-18-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/1716-20-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/1716-22-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/1716-25-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/1716-27-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/1716-32-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/1716-30-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/1716-35-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1716-37-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1716-40-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/1716-42-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/1716-46-0x0000000000400000-0x0000000001EE7000-memory.dmp

    Filesize

    26.9MB