Behavioral task
behavioral1
Sample
1064-55-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1064-55-0x0000000000400000-0x0000000000412000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1064-55-0x0000000000400000-0x0000000000412000-memory.dmp
-
Size
72KB
-
MD5
9d5ee6a7e64105e82f449382b75b5174
-
SHA1
519235deb77a58731d3c44c55a4f7c2fd7f13ddd
-
SHA256
fad48d397ddec4303dfd654313324c5d45e439ced3ec20d0f9bcdc53fbd8c5ac
-
SHA512
ba92713a5c512cf03fd7bf95d211d5f7a6a4050721dab2ab0235fa160a90aa014cd87333393549d338d01b47721fd50ca8535452a60ee2ac77af9bbd1e73e972
-
SSDEEP
768:8qOKi+7erib7i6DcJKUU1HTbqHymKYGkHrYb1sIz1Mi0MTGVq123VEcBehZVDBlY:jky1EMd1KEWexDDRcpdUooIdYfN8z
Malware Config
Extracted
raccoon
0599d39d61f45318cfeb641935520ac2
http://185.77.96.237/
-
user_agent
mozzzzzzzzzzz
Signatures
-
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1064-55-0x0000000000400000-0x0000000000412000-memory.dmp
Files
-
1064-55-0x0000000000400000-0x0000000000412000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ