Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 18:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c407d4fb0a859743e72402a90e2fece8.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
c407d4fb0a859743e72402a90e2fece8.exe
-
Size
518KB
-
MD5
c407d4fb0a859743e72402a90e2fece8
-
SHA1
1bcadf0195f31bc6713f42690fbd9f24be6a78d0
-
SHA256
db2a28f76862ebf16aae7dcdcd41535704f4ec084bd0707a61d8f0a227fc3c68
-
SHA512
c7707a74b022f7e310e775b5539100041825a34874e1c1726bf6e5af838a542881844a14ed0ca76a16c17501f923f99f3f37da959828387e31921d89f46beb94
-
SSDEEP
12288:EmvYHvkh0Rx7SdKNLiW9EibGLuSHRMNkhkFFT0NgUm+:zgPo07/cPGmhkFVr
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/3920-2-0x00000000026F0000-0x000000000277F000-memory.dmp family_raccoon_v1 behavioral2/memory/3920-3-0x0000000000400000-0x00000000023EC000-memory.dmp family_raccoon_v1 behavioral2/memory/3920-4-0x0000000000400000-0x00000000023EC000-memory.dmp family_raccoon_v1 behavioral2/memory/3920-7-0x00000000026F0000-0x000000000277F000-memory.dmp family_raccoon_v1