Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-03-2024 20:54

General

  • Target

    d9ccd79a7564b1ba6c4547e47ae93ce4.exe

  • Size

    489KB

  • MD5

    d9ccd79a7564b1ba6c4547e47ae93ce4

  • SHA1

    9e1579f7cf67c79b455b204dd79a353af6c51793

  • SHA256

    ab928dcfb571222c0f346b93befee4f06baefeb555261ddf726a2ba4a4f84abe

  • SHA512

    40f6639a76705f6fee916286146677f22b89bcafdbec8e1c89d9d58796837dadbdb2bbed8bdb8cdd5d4a584d0c7a5b1948354db0acc6056aabbc791888c005df

  • SSDEEP

    12288:A8cOenWRkCJ+PcRPe1B/jqQbI6ttWHX8h60z:jKWb8SPQj7twE60

Score
10/10

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9ccd79a7564b1ba6c4547e47ae93ce4.exe
    "C:\Users\Admin\AppData\Local\Temp\d9ccd79a7564b1ba6c4547e47ae93ce4.exe"
    1⤵
      PID:1252

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1252-1-0x0000000000D00000-0x0000000000E00000-memory.dmp

      Filesize

      1024KB

    • memory/1252-2-0x00000000027A0000-0x0000000002833000-memory.dmp

      Filesize

      588KB

    • memory/1252-3-0x0000000000400000-0x00000000009F5000-memory.dmp

      Filesize

      6.0MB

    • memory/1252-4-0x0000000000400000-0x00000000009F5000-memory.dmp

      Filesize

      6.0MB

    • memory/1252-5-0x0000000000D00000-0x0000000000E00000-memory.dmp

      Filesize

      1024KB

    • memory/1252-7-0x00000000027A0000-0x0000000002833000-memory.dmp

      Filesize

      588KB