Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/02/2024, 11:56

General

  • Target

    a91882e8effee30cef5c0648b6a2e5b3.exe

  • Size

    577KB

  • MD5

    a91882e8effee30cef5c0648b6a2e5b3

  • SHA1

    1cf6b737a02d0ab304691140661a94656249c47c

  • SHA256

    88b149d93a7d463f5e604235060c0701037195551715e0f5298a81d2f6c5436a

  • SHA512

    5a28d50089f7b375ebef37a3a6fbe2acfae242b3d2a684d9f2e0c9edba90d3994ba3b251bb555a9b51d74744116fe51b5ec49ef9e1ace210030d410360ddf655

  • SSDEEP

    12288:PTngYQ0O9+/3U09WxLIPp53VjxaWPkemteBNjfzqfH:PT3YsXraWsQ

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a91882e8effee30cef5c0648b6a2e5b3.exe
    "C:\Users\Admin\AppData\Local\Temp\a91882e8effee30cef5c0648b6a2e5b3.exe"
    1⤵
    • Modifies system certificate store
    PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2536-1-0x0000000003310000-0x0000000003410000-memory.dmp

    Filesize

    1024KB

  • memory/2536-2-0x00000000002B0000-0x0000000000341000-memory.dmp

    Filesize

    580KB

  • memory/2536-3-0x0000000000400000-0x000000000328C000-memory.dmp

    Filesize

    46.5MB

  • memory/2536-6-0x0000000003310000-0x0000000003410000-memory.dmp

    Filesize

    1024KB

  • memory/2536-7-0x00000000002B0000-0x0000000000341000-memory.dmp

    Filesize

    580KB