Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2024, 03:24

General

  • Target

    b1195bfac206ed3b04c11a891f53b2cf.exe

  • Size

    489KB

  • MD5

    b1195bfac206ed3b04c11a891f53b2cf

  • SHA1

    e808d0283df8a9ae3ceae4d021d9cf88ba195344

  • SHA256

    37be424a71c3c45d00c439ce762c6fe14c64cb02ca0d3f0fa03ba6cd26eba91d

  • SHA512

    236c40073d5b593a27ebca8d0baed1128e83ffbfbc4971be81f4bc4fa6ded69a2c1b1581d3a0b01862fc6a8152bd72f1ba77194c41ebda0fdbf334e34675c6ea

  • SSDEEP

    12288:jPZuSJ6cyZLEKIplkfuieFRIBXkVQGJizVdyf0RQu:cSJ6czfkWiwwtOOVYfpu

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1195bfac206ed3b04c11a891f53b2cf.exe
    "C:\Users\Admin\AppData\Local\Temp\b1195bfac206ed3b04c11a891f53b2cf.exe"
    1⤵
      PID:3156

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3156-1-0x0000000002480000-0x0000000002580000-memory.dmp

      Filesize

      1024KB

    • memory/3156-2-0x00000000028A0000-0x000000000292F000-memory.dmp

      Filesize

      572KB

    • memory/3156-3-0x0000000000400000-0x00000000023E4000-memory.dmp

      Filesize

      31.9MB

    • memory/3156-4-0x0000000000400000-0x00000000023E4000-memory.dmp

      Filesize

      31.9MB

    • memory/3156-6-0x0000000002480000-0x0000000002580000-memory.dmp

      Filesize

      1024KB

    • memory/3156-7-0x00000000028A0000-0x000000000292F000-memory.dmp

      Filesize

      572KB