Behavioral task
behavioral1
Sample
628-56-0x0000000000400000-0x0000000001B40000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
628-56-0x0000000000400000-0x0000000001B40000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
628-56-0x0000000000400000-0x0000000001B40000-memory.dmp
-
Size
23.2MB
-
MD5
0bfa570a512179f32561ede33fa879e9
-
SHA1
27d014e24812a76a7dd0d685b9695fb5e9872821
-
SHA256
ecd0bbedfde9878654fdde7fcfa7be4f710c1c4874b958e68521375d613cd63d
-
SHA512
1115b125a2e3b6232f704a0095826906af6e63a890942d07689266b58b9645bedeebbfdd3cd71d76e47ac7118464cc335d9ac6332f408b13b1cef18474c8269d
-
SSDEEP
6144:YMKFJFSvGpDbnD6suIhfQFTlPPpMsTbA:BKLFzpH7Ns9t
Malware Config
Extracted
raccoon
3c85f6d12f0866626b35b64056ce8880
http://5.78.98.26:8088/
-
user_agent
DuckTales
Signatures
-
Raccoon Stealer V2 payload 1 IoCs
resource yara_rule sample family_raccoon_v2 -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 628-56-0x0000000000400000-0x0000000001B40000-memory.dmp
Files
-
628-56-0x0000000000400000-0x0000000001B40000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE