Analysis

  • max time kernel
    156s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 08:28

General

  • Target

    b4415c56e45f4d727e0607a93c5d89a0.exe

  • Size

    517KB

  • MD5

    b4415c56e45f4d727e0607a93c5d89a0

  • SHA1

    4f31cd8c69b80370bf244d84bb1d36923f50b440

  • SHA256

    496b44cc8dd3131a3659fdb5a37c4a26493d9f84bac2a72d7a80215f324e5646

  • SHA512

    8cf153e081103526e87fec6908a3155b61c35b58de00f811e1cd078bcc3c3f7b515ed32fec4d252bea3d3c49db8a56f6467e5ae0562c189a70f0b6cd0315559f

  • SSDEEP

    12288:JrjcxPft0GixW3VCrVwyVR0J+qyWr/JCe4jjzN:1IJFmVY+Zw/m

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4415c56e45f4d727e0607a93c5d89a0.exe
    "C:\Users\Admin\AppData\Local\Temp\b4415c56e45f4d727e0607a93c5d89a0.exe"
    1⤵
      PID:4896

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4896-1-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

      Filesize

      1024KB

    • memory/4896-2-0x0000000004950000-0x00000000049DF000-memory.dmp

      Filesize

      572KB

    • memory/4896-3-0x0000000000400000-0x0000000002B8D000-memory.dmp

      Filesize

      39.6MB

    • memory/4896-4-0x0000000000400000-0x0000000002B8D000-memory.dmp

      Filesize

      39.6MB

    • memory/4896-6-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

      Filesize

      1024KB

    • memory/4896-7-0x0000000004950000-0x00000000049DF000-memory.dmp

      Filesize

      572KB