Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:02
Behavioral task
behavioral1
Sample
275397ccaffa5d1421f89892fc0057f2.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
275397ccaffa5d1421f89892fc0057f2.exe
-
Size
467KB
-
MD5
275397ccaffa5d1421f89892fc0057f2
-
SHA1
0637ebe6999fcd535d5b4e19fa61d88804ce9800
-
SHA256
7ccd1376c8222d085b91572804f8824427e97bfd7c3ff62a91e107a2718d5de7
-
SHA512
a4741aa95853bfdca93b80bfc5f4bba96cc6be9ef06a94722f3b3d7970f8a08c68ebb98d0452f3bce1f48ebb55caea0d55b499a82e2859bcb9a59d6f3b6f844c
-
SSDEEP
12288:V7FBIDsHqnG67lxJZkSQlD11R7yVvJJz:/2YKzRV2nYVJJ
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/3592-3-0x0000000000E20000-0x0000000000EB1000-memory.dmp family_raccoon_v1 behavioral2/memory/3592-4-0x0000000000400000-0x0000000000880000-memory.dmp family_raccoon_v1 behavioral2/memory/3592-5-0x0000000000400000-0x0000000000880000-memory.dmp family_raccoon_v1 behavioral2/memory/3592-8-0x0000000000E20000-0x0000000000EB1000-memory.dmp family_raccoon_v1 -
resource yara_rule behavioral2/memory/3592-0-0x0000000000400000-0x0000000000880000-memory.dmp upx