Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2024, 11:56

General

  • Target

    a91882e8effee30cef5c0648b6a2e5b3.exe

  • Size

    577KB

  • MD5

    a91882e8effee30cef5c0648b6a2e5b3

  • SHA1

    1cf6b737a02d0ab304691140661a94656249c47c

  • SHA256

    88b149d93a7d463f5e604235060c0701037195551715e0f5298a81d2f6c5436a

  • SHA512

    5a28d50089f7b375ebef37a3a6fbe2acfae242b3d2a684d9f2e0c9edba90d3994ba3b251bb555a9b51d74744116fe51b5ec49ef9e1ace210030d410360ddf655

  • SSDEEP

    12288:PTngYQ0O9+/3U09WxLIPp53VjxaWPkemteBNjfzqfH:PT3YsXraWsQ

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a91882e8effee30cef5c0648b6a2e5b3.exe
    "C:\Users\Admin\AppData\Local\Temp\a91882e8effee30cef5c0648b6a2e5b3.exe"
    1⤵
      PID:1716

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1716-1-0x0000000003540000-0x0000000003640000-memory.dmp

      Filesize

      1024KB

    • memory/1716-2-0x0000000004EE0000-0x0000000004F71000-memory.dmp

      Filesize

      580KB

    • memory/1716-3-0x0000000000400000-0x000000000328C000-memory.dmp

      Filesize

      46.5MB

    • memory/1716-4-0x0000000000400000-0x000000000328C000-memory.dmp

      Filesize

      46.5MB

    • memory/1716-5-0x0000000003540000-0x0000000003640000-memory.dmp

      Filesize

      1024KB

    • memory/1716-7-0x0000000004EE0000-0x0000000004F71000-memory.dmp

      Filesize

      580KB