Behavioral task
behavioral1
Sample
1052-56-0x0000000000400000-0x000000000045F000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1052-56-0x0000000000400000-0x000000000045F000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1052-56-0x0000000000400000-0x000000000045F000-memory.dmp
-
Size
380KB
-
MD5
8a1a93b4532be152722c57539defdcf3
-
SHA1
08dcc1c10109f3597583972313c990093116bb66
-
SHA256
5cb2f2ece2c7fdd2126a4ed31bdf6ab6fb40f0c32d0abdfa9961a77f4ce22e07
-
SHA512
5d6f05768e0cd3dde9a7c431ab8d2d39237e2d1a30aef941570bebfcaedd1032b5f68eed15999e40765a1b8c1c6a2c8ce9739497d245fa7ff46cc5a0fa925f95
-
SSDEEP
3072:k1EcfCXUDZI4/Y7J2OSgWj547vC28/g3xowzMCfVQxeG3ERWR3LV:MCqyJ2bgy47Eg3CLoCxvU0VB
Malware Config
Extracted
raccoon
d87b51d1771107cfddb7c7acd7727950
http://147.135.62.201/
-
user_agent
20112211
Signatures
-
Raccoon Stealer V2 payload 1 IoCs
Processes:
resource yara_rule sample family_raccoon_v2 -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1052-56-0x0000000000400000-0x000000000045F000-memory.dmp
Files
-
1052-56-0x0000000000400000-0x000000000045F000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ