Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 04:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a83df950cfdaaadaa011bda73e2a28e0.exe
Resource
win7-20240215-en
3 signatures
150 seconds
General
-
Target
a83df950cfdaaadaa011bda73e2a28e0.exe
-
Size
493KB
-
MD5
a83df950cfdaaadaa011bda73e2a28e0
-
SHA1
33055f456de39871659726ae0a3f22858b2def69
-
SHA256
85c01034f8f001668bd4369676f335560b08ceddf60257373071c9a7dff8e8a1
-
SHA512
fc8858e7acae6ee861cbecda694df87636b3203f14f4b578b5618c088a63e54672cf6712ad54e786be9f84b3313b8f51ea5cbd9dd737d15776eaab6bd2723138
-
SSDEEP
12288:rJf1RlJAqLrkogo8o0goE2PbXZKpr2MBe9rcWWARwoO:rJtRlNwLoz7zUXoZ/9WW2
Malware Config
Signatures
-
Raccoon Stealer V1 payload 3 IoCs
resource yara_rule behavioral2/memory/4652-2-0x0000000004A40000-0x0000000004AD1000-memory.dmp family_raccoon_v1 behavioral2/memory/4652-3-0x0000000000400000-0x0000000002CB1000-memory.dmp family_raccoon_v1 behavioral2/memory/4652-6-0x0000000004A40000-0x0000000004AD1000-memory.dmp family_raccoon_v1