Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-02-2024 01:48

General

  • Target

    9ca1b42cc5e42908becfeb3e21851fe0.exe

  • Size

    490KB

  • MD5

    9ca1b42cc5e42908becfeb3e21851fe0

  • SHA1

    b8487fcb1d3d51f3f3cd1f423ae65af5cee22778

  • SHA256

    2df6e62ed9849442af436c06d3d5166a78d81837193c5c1556df4f5e19b6ac65

  • SHA512

    5c9c5fc9783a67e3d7b76dae79e800b4351e720ae7de91cde9ad3989b1918800a502d9c35681110073bdc602ab09358c70a94e689a34b6c278d1622f02242c46

  • SSDEEP

    12288:DNzxydNGmvII/+a7Z1HKA/NGbolYOXWVcT:hcdNGNaZ5K68ElLGVc

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

cd8dc1031358b1aec55cc6bc447df1018b068607

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ca1b42cc5e42908becfeb3e21851fe0.exe
    "C:\Users\Admin\AppData\Local\Temp\9ca1b42cc5e42908becfeb3e21851fe0.exe"
    1⤵
      PID:4336

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4336-1-0x0000000000690000-0x0000000000790000-memory.dmp
      Filesize

      1024KB

    • memory/4336-2-0x00000000022D0000-0x0000000002361000-memory.dmp
      Filesize

      580KB

    • memory/4336-3-0x0000000000400000-0x0000000000495000-memory.dmp
      Filesize

      596KB

    • memory/4336-5-0x00000000022D0000-0x0000000002361000-memory.dmp
      Filesize

      580KB

    • memory/4336-7-0x0000000000690000-0x0000000000790000-memory.dmp
      Filesize

      1024KB