Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
cfc6452cdc5ead4a1e8ad4f6e1a87e4f.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
cfc6452cdc5ead4a1e8ad4f6e1a87e4f.exe
-
Size
5.3MB
-
MD5
cfc6452cdc5ead4a1e8ad4f6e1a87e4f
-
SHA1
72b86af71e4e5e9df3a350e3813a75e303bd1b16
-
SHA256
ee2b2b713a6300e185074b3e7ebacbe04e993cd20ea6ffbb4b065d35aa375153
-
SHA512
09bccce94c5a51f3b85e3bd2a8e023ec7cab26d161343854920105931ea7c1aa9c13184a65d2e32fbf42ad99796281c46903a2f65f48824baaf86dd32ac7e887
-
SSDEEP
98304:PEBJXQsW/kFGAgz3Qq9V8Rtj6TkAY7wZWYfTJUULBJSvAiWbESPjNsWxW/exAYoY:8VFGXQzr8vXfTJU6SvAiWbtPP87PWUaL
Malware Config
Signatures
-
Raccoon Stealer V1 payload 3 IoCs
resource yara_rule behavioral2/memory/220-3-0x0000000000400000-0x0000000000CB8000-memory.dmp family_raccoon_v1 behavioral2/memory/220-1-0x0000000000400000-0x0000000000CB8000-memory.dmp family_raccoon_v1 behavioral2/memory/220-7-0x0000000000400000-0x0000000000CB8000-memory.dmp family_raccoon_v1 -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 220 cfc6452cdc5ead4a1e8ad4f6e1a87e4f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 220 cfc6452cdc5ead4a1e8ad4f6e1a87e4f.exe 220 cfc6452cdc5ead4a1e8ad4f6e1a87e4f.exe