General
-
Target
1384-989-0x0000000000400000-0x000000000040F000-memory.dmp
-
Size
60KB
-
Sample
240312-p32ybshc6x
-
MD5
5c05a2cd05caa2ee3d6af08da3ce5e7c
-
SHA1
4c2ebb5e1eb347c9ce45662924be65e782e63218
-
SHA256
a9dddd514c4c8c9184fc84389755712dbd284401655fa0c81a394836a4082f48
-
SHA512
97450e2addf5408abc7fe5dac641f839ae1cc0464c1826fe4f9cb9d1fc53d92508e1bf0704ce4ad77cec4484d797af6612a464385609a3ea920e58603e1363f1
-
SSDEEP
768:TVcCo1dt4cybqx7P9vm9Rg6+E7apmW4Kmsk:T2t4cybq56O4K4
Behavioral task
behavioral1
Sample
1384-989-0x0000000000400000-0x000000000040F000-memory.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1384-989-0x0000000000400000-0x000000000040F000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
raccoon
071a7b18a42c1cd94de2fc5bb0bbcaf2
http://85.209.134.122:80/
-
user_agent
DuckTales
Targets
-
-
Target
1384-989-0x0000000000400000-0x000000000040F000-memory.dmp
-
Size
60KB
-
MD5
5c05a2cd05caa2ee3d6af08da3ce5e7c
-
SHA1
4c2ebb5e1eb347c9ce45662924be65e782e63218
-
SHA256
a9dddd514c4c8c9184fc84389755712dbd284401655fa0c81a394836a4082f48
-
SHA512
97450e2addf5408abc7fe5dac641f839ae1cc0464c1826fe4f9cb9d1fc53d92508e1bf0704ce4ad77cec4484d797af6612a464385609a3ea920e58603e1363f1
-
SSDEEP
768:TVcCo1dt4cybqx7P9vm9Rg6+E7apmW4Kmsk:T2t4cybq56O4K4
Score3/10 -