Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 05:54

General

  • Target

    d55d3d69132f9c5b385567127a2e6569.exe

  • Size

    533KB

  • MD5

    d55d3d69132f9c5b385567127a2e6569

  • SHA1

    fc21857db2a4dcecd7ea70640893351caa11f030

  • SHA256

    ed7f141aa53017f734f508ee23f427fc7ecac0f6bfa6278907c1fce6f4bac252

  • SHA512

    3cf10be023921706fd973eeda0eef2eb7688a443bd817e15c589b16f3cb31e21d3ae06c5e102773fab0d28c96ca0fad796435ce69c9c60e8f93824a6d681ffca

  • SSDEEP

    12288:nGP91wRxUCJa3FjVxqzI4Js70WuwUsClSr0cXA:nGP91wQUoj7qzI4JITddESr0c

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d55d3d69132f9c5b385567127a2e6569.exe
    "C:\Users\Admin\AppData\Local\Temp\d55d3d69132f9c5b385567127a2e6569.exe"
    1⤵
      PID:3636

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3636-1-0x0000000000D90000-0x0000000000E90000-memory.dmp

      Filesize

      1024KB

    • memory/3636-2-0x0000000002830000-0x00000000028C3000-memory.dmp

      Filesize

      588KB

    • memory/3636-3-0x0000000000400000-0x00000000009F1000-memory.dmp

      Filesize

      5.9MB

    • memory/3636-4-0x0000000000400000-0x00000000009F1000-memory.dmp

      Filesize

      5.9MB

    • memory/3636-6-0x0000000000D90000-0x0000000000E90000-memory.dmp

      Filesize

      1024KB

    • memory/3636-7-0x0000000002830000-0x00000000028C3000-memory.dmp

      Filesize

      588KB