Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 18:20

General

  • Target

    c147c0349ac70feac6aba4a359a430d7.exe

  • Size

    518KB

  • MD5

    c147c0349ac70feac6aba4a359a430d7

  • SHA1

    8ce004c561dad0f937df9b191e4938fc40d931f7

  • SHA256

    6c0a5a0ad7813fc8cde39df0401d1ac5c0e7478acd93516fa5b6795a6a31692a

  • SHA512

    627e874d19ebc7e3f66b72b4be2838f59784a3afb01373163081a975e2798b96a1247a5c8e81a70020f064ea7e2c136bef4f4744422e2fe58eab05c191bcecd8

  • SSDEEP

    12288:I8vYA1GlRx7PhFXsv6Ai61Hv3GGrNav0FF:Rgae7zwyOfGGrNas

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c147c0349ac70feac6aba4a359a430d7.exe
    "C:\Users\Admin\AppData\Local\Temp\c147c0349ac70feac6aba4a359a430d7.exe"
    1⤵
      PID:2872

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2872-1-0x0000000002700000-0x0000000002800000-memory.dmp

      Filesize

      1024KB

    • memory/2872-2-0x00000000024C0000-0x000000000254F000-memory.dmp

      Filesize

      572KB

    • memory/2872-3-0x0000000000400000-0x00000000023EC000-memory.dmp

      Filesize

      31.9MB

    • memory/2872-4-0x0000000000400000-0x00000000023EC000-memory.dmp

      Filesize

      31.9MB

    • memory/2872-6-0x0000000002700000-0x0000000002800000-memory.dmp

      Filesize

      1024KB

    • memory/2872-7-0x00000000024C0000-0x000000000254F000-memory.dmp

      Filesize

      572KB