Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 18:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
af330dc8f44e538e382b175398484068.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
af330dc8f44e538e382b175398484068.exe
-
Size
461KB
-
MD5
af330dc8f44e538e382b175398484068
-
SHA1
79da00442b415855a6215e958d6069cfe526815f
-
SHA256
96705f492ccbba730a3745b9c27c836ff7b877c78f59d08b797a57faaebcd6ed
-
SHA512
79a3045b9ae0392a6a9c26424ad44ca1e7fa396f0d3b320ac0fddeb9a6759dba5286b36ed49a40ab4b13b089ddeebd92e889916fd5eff9a06ab15a725be4d648
-
SSDEEP
12288:kdeyC7T93blTbV9yGVPgZxPwGurpGo9HGjwoO:kde593JTbV91oZWG0AUHG3
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/3212-2-0x0000000002E10000-0x0000000002EA1000-memory.dmp family_raccoon_v1 behavioral2/memory/3212-3-0x0000000000400000-0x0000000002CAA000-memory.dmp family_raccoon_v1 behavioral2/memory/3212-4-0x0000000000400000-0x0000000002CAA000-memory.dmp family_raccoon_v1 behavioral2/memory/3212-6-0x0000000002E10000-0x0000000002EA1000-memory.dmp family_raccoon_v1