Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 12:50

General

  • Target

    c0a142b43066b0955570641498920957.exe

  • Size

    487KB

  • MD5

    c0a142b43066b0955570641498920957

  • SHA1

    00555079ce2c7f2a53f06f01023f4504c4d9d149

  • SHA256

    62dc6d106cefc8277867d471d1345ce176b7670e464104f74cda40f15a3a5515

  • SHA512

    9b44c69b54921c94034799bff9edf8eb5929d0b7384db3924a8682c6e8d1f3dd3ca727ec3071874c4b736f058defadfb752406230772edce491a82955aa44c03

  • SSDEEP

    12288:nGYbPw5bQwLysinCcRA0Palthx4tITAc0HkiP/3:G2Yejx60PqtrAuAcwNP

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0a142b43066b0955570641498920957.exe
    "C:\Users\Admin\AppData\Local\Temp\c0a142b43066b0955570641498920957.exe"
    1⤵
      PID:2980

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2980-1-0x0000000002E50000-0x0000000002F50000-memory.dmp

      Filesize

      1024KB

    • memory/2980-2-0x00000000047F0000-0x000000000487F000-memory.dmp

      Filesize

      572KB

    • memory/2980-3-0x0000000000400000-0x0000000002B84000-memory.dmp

      Filesize

      39.5MB

    • memory/2980-5-0x0000000002E50000-0x0000000002F50000-memory.dmp

      Filesize

      1024KB

    • memory/2980-7-0x00000000047F0000-0x000000000487F000-memory.dmp

      Filesize

      572KB