Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 10:20
Static task
static1
Behavioral task
behavioral1
Sample
0352efa7f13242b9e4c0603b8d420a0e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0352efa7f13242b9e4c0603b8d420a0e.exe
Resource
win10v2004-20231215-en
General
-
Target
0352efa7f13242b9e4c0603b8d420a0e.exe
-
Size
532KB
-
MD5
0352efa7f13242b9e4c0603b8d420a0e
-
SHA1
bfed2d6e8515ec820e8ef9ab44f14fae5ebe1c2b
-
SHA256
e382fb33e82db45928941b51ecc2990a3241a6c79c3715ab14a590830e00a805
-
SHA512
d3bcf3bce270a6ebe4ac9c53b9ef5e785964fd473c6c793d34dacf3dfdd0065a4e2ec6bdf33eb6571b7814b922e317b8d652b643755f8339692eb06793c8c7e0
-
SSDEEP
12288:G7C/uj3/3MY9wZZkLGefxrxp+valtTlZKaYOw9zxp6LT:G7XDNyZVefxrxp+SltrX636LT
Malware Config
Extracted
raccoon
1.8.2
e672747afc67feb221ca60f8fc9e03adcf10f038
-
url4cnc
http://teletop.top/youyouhell0world
http://teleta.top/youyouhell0world
https://t.me/youyouhell0world
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-2-0x0000000000220000-0x00000000002AE000-memory.dmp family_raccoon_v1 behavioral1/memory/2360-3-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral1/memory/2360-4-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral1/memory/2360-7-0x0000000000220000-0x00000000002AE000-memory.dmp family_raccoon_v1
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2360-1-0x0000000000640000-0x0000000000740000-memory.dmpFilesize
1024KB
-
memory/2360-2-0x0000000000220000-0x00000000002AE000-memory.dmpFilesize
568KB
-
memory/2360-3-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/2360-4-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/2360-5-0x0000000000640000-0x0000000000740000-memory.dmpFilesize
1024KB
-
memory/2360-7-0x0000000000220000-0x00000000002AE000-memory.dmpFilesize
568KB