Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2023 16:51

General

  • Target

    8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe

  • Size

    17.1MB

  • MD5

    609aae1b7204c854d660c22179ece445

  • SHA1

    897ac7d1a4583d4a57ee9b6f045e13bcc89b0229

  • SHA256

    8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751

  • SHA512

    5602d7ece0d0ca7e94bc348b3b6284d45dc0cf31982eedd54ea3f5fdc860a00be5a61eb0d4d89410f549fd29b156511085ec16af8a1fc43f0ee2aa5a14f2b9ab

  • SSDEEP

    393216:LymUDdRkuhbXo8u8jMB5yU9sWwOExGTkuRe1jkgIBN1:2m6bdoOjeQUKZ7AIuRe1uBN

Malware Config

Extracted

Family

raccoon

Botnet

d4dfe058bb722373a292317097b425f0

C2

http://37.49.230.54:80

http://37.49.230.152:80

Attributes
  • user_agent

    GeekingToTheMoon

xor.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe
    "C:\Users\Admin\AppData\Local\Temp\8504046c2ea601460e42d3a1ca05020cc49316a9dfa535b25d99535ad5f13751exe.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/676-0-0x0000000001FD0000-0x0000000001FD1000-memory.dmp

    Filesize

    4KB

  • memory/676-2-0x00000000020C0000-0x00000000020C1000-memory.dmp

    Filesize

    4KB

  • memory/676-3-0x0000000000400000-0x0000000001EE7000-memory.dmp

    Filesize

    26.9MB

  • memory/676-4-0x00000000020F0000-0x00000000020F1000-memory.dmp

    Filesize

    4KB

  • memory/676-1-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

    Filesize

    4KB

  • memory/676-5-0x0000000002100000-0x0000000002101000-memory.dmp

    Filesize

    4KB

  • memory/676-6-0x0000000002510000-0x0000000002511000-memory.dmp

    Filesize

    4KB

  • memory/676-7-0x0000000002520000-0x0000000002521000-memory.dmp

    Filesize

    4KB

  • memory/676-8-0x0000000002530000-0x0000000002531000-memory.dmp

    Filesize

    4KB

  • memory/676-10-0x0000000000400000-0x0000000001EE7000-memory.dmp

    Filesize

    26.9MB

  • memory/676-13-0x0000000000400000-0x0000000001EE7000-memory.dmp

    Filesize

    26.9MB