Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 03:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b11622f0ab180366686de3d7d4d1e007.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
b11622f0ab180366686de3d7d4d1e007.exe
-
Size
527KB
-
MD5
b11622f0ab180366686de3d7d4d1e007
-
SHA1
539472aa133586b27c555f63f067e75e48649348
-
SHA256
d13dde4821d278b24f417bc51b39197789197ec45af4b9ac7fba05819209167c
-
SHA512
47d8ec39ab7089d8b32b5086062d8294725ff05710b3548c1de63bda3e685cb1016d96e9bbd7fd550d5e6efaa187753f6339f229e5b2623bc68c61e0c4828e64
-
SSDEEP
12288:Y3hcAi/xktuf+UcSlxDScqPb3ZuW9VYF3tC7Ga+u:H/xkmlBq/VYF3IR
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/4584-2-0x00000000026A0000-0x000000000272F000-memory.dmp family_raccoon_v1 behavioral2/memory/4584-3-0x0000000000400000-0x00000000023EF000-memory.dmp family_raccoon_v1 behavioral2/memory/4584-4-0x0000000000400000-0x00000000023EF000-memory.dmp family_raccoon_v1 behavioral2/memory/4584-7-0x00000000026A0000-0x000000000272F000-memory.dmp family_raccoon_v1