Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 06:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d571e9d6e2fe9134b0e1b4c6a0b6945d.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
d571e9d6e2fe9134b0e1b4c6a0b6945d.exe
-
Size
523KB
-
MD5
d571e9d6e2fe9134b0e1b4c6a0b6945d
-
SHA1
ce544f86aa6c86f3413adcb691370a4d8877f9dd
-
SHA256
60a1a8f99a505b8069487bf97d34f005c5ef208651b35950a38bb8dc9aa8ad89
-
SHA512
09bbfee2dfa29e00e6e032e954457ff50f197742ed32a257fbf4f017e5469d3f683f594f5b37da94f20c8ec05b8c85240b9367b91a776a8ac019a3e1f8ce9f74
-
SSDEEP
12288:VD9dKungwuNFjgSPUMMvG1vVYgoa2Ha2hVLsEiLcbUQyWEB:VrnruZUMMqvVj2b/uZB
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/4212-2-0x0000000004060000-0x00000000040EF000-memory.dmp family_raccoon_v1 behavioral2/memory/4212-3-0x0000000000400000-0x00000000023ED000-memory.dmp family_raccoon_v1 behavioral2/memory/4212-4-0x0000000000400000-0x00000000023ED000-memory.dmp family_raccoon_v1 behavioral2/memory/4212-7-0x0000000004060000-0x00000000040EF000-memory.dmp family_raccoon_v1