Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/02/2024, 01:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
90ba98cd1e82fe56b6298d223fce19e8.exe
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
90ba98cd1e82fe56b6298d223fce19e8.exe
-
Size
484KB
-
MD5
90ba98cd1e82fe56b6298d223fce19e8
-
SHA1
3be8aae5fe56079539f6031678ac33f6ac79e37b
-
SHA256
a2f1c5af04a6f8e79461bdaa3847ba47c7a7bb03d2689c9577035a4f49b6f133
-
SHA512
70a39692467e2a24b8d2223209d3a3673fb36eb705fa6e2f73404a655bd3fb536023965df308bb6bdc70b73a47086a8df5d5e15321edf4e3a7e6bee1998e5903
-
SSDEEP
6144:zuAKghYlfP7Fz5Fgo+S0wHhzViVM+zncJ0Pnqr1zwl/EIoB3i3GllxH9/OfSGKP2:+fgoRHF8MGeYC5iIbpPVUxJAAw
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/4192-2-0x00000000049F0000-0x0000000004A81000-memory.dmp family_raccoon_v1 behavioral2/memory/4192-3-0x0000000000400000-0x0000000002CAF000-memory.dmp family_raccoon_v1 behavioral2/memory/4192-4-0x0000000000400000-0x0000000002CAF000-memory.dmp family_raccoon_v1 behavioral2/memory/4192-7-0x00000000049F0000-0x0000000004A81000-memory.dmp family_raccoon_v1