Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    15-02-2024 01:48

General

  • Target

    9ca1b42cc5e42908becfeb3e21851fe0.exe

  • Size

    490KB

  • MD5

    9ca1b42cc5e42908becfeb3e21851fe0

  • SHA1

    b8487fcb1d3d51f3f3cd1f423ae65af5cee22778

  • SHA256

    2df6e62ed9849442af436c06d3d5166a78d81837193c5c1556df4f5e19b6ac65

  • SHA512

    5c9c5fc9783a67e3d7b76dae79e800b4351e720ae7de91cde9ad3989b1918800a502d9c35681110073bdc602ab09358c70a94e689a34b6c278d1622f02242c46

  • SSDEEP

    12288:DNzxydNGmvII/+a7Z1HKA/NGbolYOXWVcT:hcdNGNaZ5K68ElLGVc

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

cd8dc1031358b1aec55cc6bc447df1018b068607

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ca1b42cc5e42908becfeb3e21851fe0.exe
    "C:\Users\Admin\AppData\Local\Temp\9ca1b42cc5e42908becfeb3e21851fe0.exe"
    1⤵
    • Modifies system certificate store
    PID:2408

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2408-1-0x0000000000290000-0x0000000000390000-memory.dmp
    Filesize

    1024KB

  • memory/2408-2-0x00000000004A0000-0x0000000000531000-memory.dmp
    Filesize

    580KB

  • memory/2408-3-0x0000000000400000-0x0000000000495000-memory.dmp
    Filesize

    596KB

  • memory/2408-4-0x0000000000400000-0x0000000000495000-memory.dmp
    Filesize

    596KB

  • memory/2408-5-0x0000000000290000-0x0000000000390000-memory.dmp
    Filesize

    1024KB

  • memory/2408-7-0x00000000004A0000-0x0000000000531000-memory.dmp
    Filesize

    580KB