Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 06:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4581fe88b07c75a58f2d568a906666d7.exe
Resource
win7-20231129-en
3 signatures
150 seconds
General
-
Target
4581fe88b07c75a58f2d568a906666d7.exe
-
Size
527KB
-
MD5
4581fe88b07c75a58f2d568a906666d7
-
SHA1
fe10977737ae6039559d68b6def0dc268e3c4944
-
SHA256
3767b2aa5033d8a966e8217dec4af05cc994b76347411b41599e3e4309ea3d98
-
SHA512
ac77bdee21be4c0597e8350c7838e1f0cd781f72e16bcc0baf6da14f26f4e67595c65042e685c722f3d2ba4e5631faf2888441ce1cbccf96d798dbb2caee84d1
-
SSDEEP
12288:oTkwsIyjS+USGDAzDuGTHTFIhKi6toBPAi:oFIO+dfPRgBPA
Malware Config
Signatures
-
Raccoon Stealer V1 payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2984-2-0x0000000002670000-0x0000000002703000-memory.dmp family_raccoon_v1 behavioral2/memory/2984-3-0x0000000000400000-0x00000000008ED000-memory.dmp family_raccoon_v1 behavioral2/memory/2984-7-0x0000000002670000-0x0000000002703000-memory.dmp family_raccoon_v1
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2984-1-0x0000000000AD0000-0x0000000000BD0000-memory.dmpFilesize
1024KB
-
memory/2984-2-0x0000000002670000-0x0000000002703000-memory.dmpFilesize
588KB
-
memory/2984-3-0x0000000000400000-0x00000000008ED000-memory.dmpFilesize
4.9MB
-
memory/2984-5-0x0000000000AD0000-0x0000000000BD0000-memory.dmpFilesize
1024KB
-
memory/2984-7-0x0000000002670000-0x0000000002703000-memory.dmpFilesize
588KB