Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 04:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c4f1d1df5f26b84e62662d880fb8b1ae.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
c4f1d1df5f26b84e62662d880fb8b1ae.exe
-
Size
491KB
-
MD5
c4f1d1df5f26b84e62662d880fb8b1ae
-
SHA1
b98e79e81813513ef5c072782fb7849aaecfe64e
-
SHA256
274114d51a9ea000691dd5c63f7a7ef6b381742b1e4abba2d25b14433800cd3c
-
SHA512
04fabcd07b252cb4343ba38af02d350484c271958e80fe20f787e5a2c015c669c4278c69c22188a6ef17a09c877c0eef49dfacc905ab925800e54e848955210e
-
SSDEEP
12288:rWWWIW5WyokluYZWFuEz3ru8JdARwoO1O:xW5WbKuqWoEz68L2p
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/2884-2-0x00000000048C0000-0x0000000004951000-memory.dmp family_raccoon_v1 behavioral2/memory/2884-3-0x0000000000400000-0x0000000002CB1000-memory.dmp family_raccoon_v1 behavioral2/memory/2884-4-0x0000000000400000-0x0000000002CB1000-memory.dmp family_raccoon_v1 behavioral2/memory/2884-7-0x00000000048C0000-0x0000000004951000-memory.dmp family_raccoon_v1