Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 22:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a4b72c6607b91a89f0c85882f3637bbb.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
a4b72c6607b91a89f0c85882f3637bbb.exe
-
Size
493KB
-
MD5
a4b72c6607b91a89f0c85882f3637bbb
-
SHA1
e8dbfe73f802b741f74edd831417e74a78ba7df9
-
SHA256
aeffd038c96cc13f2ea67b32bab2b0bf50ccda317804ef2ae64c79fc170bbd7e
-
SHA512
82579b31e807c605656cece3fc233631f8e83d9ac171332c0811538bbd319e6d29402abba1f2a980d6f322615c824e3fd2cd34217a6785feb1e865c56c6df596
-
SSDEEP
12288:5RZB/fELPvFwXRMgzmrUDtEdpSUh0PnARwoOA7:5RjEL3quimdpSvPn2b
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/4932-2-0x0000000004A80000-0x0000000004B11000-memory.dmp family_raccoon_v1 behavioral2/memory/4932-3-0x0000000000400000-0x0000000002CB1000-memory.dmp family_raccoon_v1 behavioral2/memory/4932-4-0x0000000000400000-0x0000000002CB1000-memory.dmp family_raccoon_v1 behavioral2/memory/4932-7-0x0000000004A80000-0x0000000004B11000-memory.dmp family_raccoon_v1