Analysis
-
max time kernel
150s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 00:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ad310ec6a6d2417e26107aad44da6a99.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
ad310ec6a6d2417e26107aad44da6a99.exe
-
Size
514KB
-
MD5
ad310ec6a6d2417e26107aad44da6a99
-
SHA1
35bc6fc70796ba0f16e002241ea407202af479bb
-
SHA256
925ec2c86ef50496d7400fa29a960b9547ad21ae2bb57907549368e4bd27cc43
-
SHA512
9e1fcb708eac16473bc2b38973bac61b48b351bcc35288f3c88da15a4e73a17af4456a1aef77c9899108b8db86d2bb434908cacfd9746a9daeea140d8cd7c4ff
-
SSDEEP
6144:HvSyD3uN6bbXficSEPg3BMkyx67hzKuai/UP81Xp2EaEVEMBwRu0BSTDr0e00lDh:qyzuYbbXKcjg3BwUdMPADX97TnJRD0
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/1560-2-0x0000000002180000-0x0000000002211000-memory.dmp family_raccoon_v1 behavioral2/memory/1560-3-0x0000000000400000-0x0000000000504000-memory.dmp family_raccoon_v1 behavioral2/memory/1560-4-0x0000000000400000-0x0000000000504000-memory.dmp family_raccoon_v1 behavioral2/memory/1560-7-0x0000000002180000-0x0000000002211000-memory.dmp family_raccoon_v1