Analysis
-
max time kernel
190s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 16:16
Static task
static1
Behavioral task
behavioral1
Sample
7bfe112db443b1d0b3368ca8caed2051.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7bfe112db443b1d0b3368ca8caed2051.exe
Resource
win10v2004-20231215-en
General
-
Target
7bfe112db443b1d0b3368ca8caed2051.exe
-
Size
580KB
-
MD5
7bfe112db443b1d0b3368ca8caed2051
-
SHA1
d0f35618a84dda4e88391c80d8b8ff8025ec3a27
-
SHA256
97f21ba207ce6b13dc6f9007bc6d45724b4b65336a6754f94e09e8021f56e6f2
-
SHA512
254046b87e168dd05b18df07191961c7ff3e6450d41eedf0578d31f17d278b88262b3b53874afadbc1f7bac3fc8909e823935515264b54f5e2d8fe05f3e4aafc
-
SSDEEP
12288:ynUOJQh5RZn/GLslaySdNbwBrbHP6cAC9v64zjY//+7kI3E+whiBYjS:ync5RZn/GLslCw5bv6BUvp8/voENhW
Malware Config
Extracted
raccoon
1.7.3
cd8dc1031358b1aec55cc6bc447df1018b068607
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2296-2-0x00000000020C0000-0x0000000002151000-memory.dmp family_raccoon_v1 behavioral2/memory/2296-3-0x0000000000400000-0x00000000004AC000-memory.dmp family_raccoon_v1 behavioral2/memory/2296-5-0x0000000000400000-0x00000000004AC000-memory.dmp family_raccoon_v1 behavioral2/memory/2296-7-0x00000000020C0000-0x0000000002151000-memory.dmp family_raccoon_v1 behavioral2/memory/2296-8-0x0000000000400000-0x00000000004AC000-memory.dmp family_raccoon_v1