Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2024, 08:50

General

  • Target

    d316fe23edde074b378824dde37007a9.exe

  • Size

    526KB

  • MD5

    d316fe23edde074b378824dde37007a9

  • SHA1

    8e5512878a6394289d21fdeeacc0a9568c2b1ac2

  • SHA256

    73e096bfd4c6bbfc56d921599ec8daf5b45685eaa89281f77957d83f1dce2172

  • SHA512

    0bb6ad81f601873b7dfeab1410b426edc3f6a893ba26fae88c5f53cfac2978390dd6af9d77523acec2225405dcc193bac3463ee9b8414f93dd971e710a406c81

  • SSDEEP

    12288:8KlJFs+Q50xv/0GonkM9stxlknhDkDt2uBPAi:RjFs+QU/0GIf9OcMBPA

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d316fe23edde074b378824dde37007a9.exe
    "C:\Users\Admin\AppData\Local\Temp\d316fe23edde074b378824dde37007a9.exe"
    1⤵
      PID:3336

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3336-1-0x0000000000BC0000-0x0000000000CC0000-memory.dmp

      Filesize

      1024KB

    • memory/3336-2-0x0000000002660000-0x00000000026F3000-memory.dmp

      Filesize

      588KB

    • memory/3336-3-0x0000000000400000-0x00000000008ED000-memory.dmp

      Filesize

      4.9MB

    • memory/3336-4-0x0000000000400000-0x00000000008ED000-memory.dmp

      Filesize

      4.9MB

    • memory/3336-6-0x0000000000BC0000-0x0000000000CC0000-memory.dmp

      Filesize

      1024KB

    • memory/3336-7-0x0000000002660000-0x00000000026F3000-memory.dmp

      Filesize

      588KB