Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-03-2024 03:18

General

  • Target

    b11622f0ab180366686de3d7d4d1e007.exe

  • Size

    527KB

  • MD5

    b11622f0ab180366686de3d7d4d1e007

  • SHA1

    539472aa133586b27c555f63f067e75e48649348

  • SHA256

    d13dde4821d278b24f417bc51b39197789197ec45af4b9ac7fba05819209167c

  • SHA512

    47d8ec39ab7089d8b32b5086062d8294725ff05710b3548c1de63bda3e685cb1016d96e9bbd7fd550d5e6efaa187753f6339f229e5b2623bc68c61e0c4828e64

  • SSDEEP

    12288:Y3hcAi/xktuf+UcSlxDScqPb3ZuW9VYF3tC7Ga+u:H/xkmlBq/VYF3IR

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b11622f0ab180366686de3d7d4d1e007.exe
    "C:\Users\Admin\AppData\Local\Temp\b11622f0ab180366686de3d7d4d1e007.exe"
    1⤵
      PID:4584

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4584-1-0x0000000002750000-0x0000000002850000-memory.dmp

      Filesize

      1024KB

    • memory/4584-2-0x00000000026A0000-0x000000000272F000-memory.dmp

      Filesize

      572KB

    • memory/4584-3-0x0000000000400000-0x00000000023EF000-memory.dmp

      Filesize

      31.9MB

    • memory/4584-4-0x0000000000400000-0x00000000023EF000-memory.dmp

      Filesize

      31.9MB

    • memory/4584-5-0x0000000002750000-0x0000000002850000-memory.dmp

      Filesize

      1024KB

    • memory/4584-7-0x00000000026A0000-0x000000000272F000-memory.dmp

      Filesize

      572KB