Behavioral task
behavioral1
Sample
4484-135-0x0000000000400000-0x00000000006C7000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4484-135-0x0000000000400000-0x00000000006C7000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
4484-135-0x0000000000400000-0x00000000006C7000-memory.dmp
-
Size
2.8MB
-
MD5
c94d13029e417681ab87722b366bc52f
-
SHA1
8076a9477d2b3f89d458318ca8dbff817b3fe05b
-
SHA256
91a625c37368c1124820d029f58dc7292bfb0cbb9dbdb09dbc4935784ebc466a
-
SHA512
da20f34f9d5366a6c5b693fe9a378312743fdccc7b6c049aa9d68fc02c76218a645f615853e1243e3a2b56cd54135f053cc8a5d62f99660b25dfa0f65f9b2d27
-
SSDEEP
6144:1cNf7P/wxlb7BmHluEAaz9mvb9/pTqHu8uiHL:aN7plnLz9mT9/EO8LL
Malware Config
Extracted
raccoon
5b7eff386f31487f5db4c7f0e4006546
http://165.232.118.86/
-
user_agent
AYAYAYAY1337
Signatures
-
Raccoon Stealer V2 payload 1 IoCs
resource yara_rule sample family_raccoon_v2 -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4484-135-0x0000000000400000-0x00000000006C7000-memory.dmp
Files
-
4484-135-0x0000000000400000-0x00000000006C7000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ