Behavioral task
behavioral1
Sample
2320-57-0x0000000000400000-0x0000000002B46000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2320-57-0x0000000000400000-0x0000000002B46000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
2320-57-0x0000000000400000-0x0000000002B46000-memory.dmp
-
Size
39.3MB
-
MD5
2a6188f54fef051b2dd7c8b18dff180c
-
SHA1
8c84942e281bc3cac3b9bbd09e060a8f660a4e73
-
SHA256
5104ce7186223f7624223581286c70167a9d8edaeaf78dfd22264866bd3eb71f
-
SHA512
5643dea93a99e118ee9de4d27860a857a55fce1523710e15f42aad676e1ebe16af8d9535023899a45d3d57c8a3dffddfa4c8b19ebb8b92d427df1c85200f6b5f
-
SSDEEP
3072:YyNbF2zBvcA20LrI2GcyyOwtv/08PzPcP0K:Yyb+vc9+I2Gc7/10IzPcs
Malware Config
Extracted
raccoon
6e489b600db6a7cfd6a1b65b9a5a61eb
http://5.78.111.161:8088/
-
user_agent
DuckTales
Signatures
-
Raccoon Stealer V2 payload 1 IoCs
resource yara_rule sample family_raccoon_v2 -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2320-57-0x0000000000400000-0x0000000002B46000-memory.dmp
Files
-
2320-57-0x0000000000400000-0x0000000002B46000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE