Behavioral task
behavioral1
Sample
1980-75-0x0000000000400000-0x00000000015FA000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1980-75-0x0000000000400000-0x00000000015FA000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1980-75-0x0000000000400000-0x00000000015FA000-memory.dmp
-
Size
18.0MB
-
MD5
f12c5a3559d1fb2bdb1feabf1b4b650e
-
SHA1
28205af3b44718db90fbaa36bc64c59ac043f3b2
-
SHA256
3accb1f8667f6ae5b659181c01437b77dae382fd82cb4776cff7446eefae2e71
-
SHA512
b1c7c73f82ad27ee514b38f8fdc63fb372ec6e8257c0b51148c57c78af70bb3bb3a5fcafb4d7145a3f9a0489e2c7ae60395536343e2d30e89b7ef3e2255c90b1
-
SSDEEP
393216:JHFUhWQdWmZjuvCknsO5k1l8TfsXxnhZWWW69yy5psfzAL:uWQh9uvCU0fWmxnhYj6AyYA
Malware Config
Extracted
raccoon
d44ad6b9c89ee584aec42cb7b3600d20
http://185.106.92.48
-
user_agent
901785252112
Signatures
-
Raccoon Stealer V2 payload 1 IoCs
resource yara_rule sample family_raccoon_v2 -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1980-75-0x0000000000400000-0x00000000015FA000-memory.dmp
Files
-
1980-75-0x0000000000400000-0x00000000015FA000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.]#> Size: - Virtual size: 7.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.;'M Size: 1024B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.uWo Size: 10.0MB - Virtual size: 10.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 342KB - Virtual size: 341KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ