Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 17:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
de94ceb549560e3acd0119ad095d4d7a.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
de94ceb549560e3acd0119ad095d4d7a.exe
-
Size
534KB
-
MD5
de94ceb549560e3acd0119ad095d4d7a
-
SHA1
f0d8775e5545cf752f6dc578fa3203dbc27da8a7
-
SHA256
90fb51c06c78c689a3c236b3fa707624a22559c74037d180e270ca4529e33f48
-
SHA512
28e23ce75479ba64f496b26aa801cebb066f4698ace937f8d8a9850f8189b3183a6747dd8de98f598e606fa657a199587b17efe0cd1499af003f2ddc808775fc
-
SSDEEP
12288:e/k87RIAR67tj2wxtV2r/UfLX7Z4WDLaXivTJXKmiNPk75L6:e1IAR67Zasf714WPkivT1Kod6
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/3256-2-0x00000000024C0000-0x000000000254F000-memory.dmp family_raccoon_v1 behavioral2/memory/3256-3-0x0000000000400000-0x00000000023F0000-memory.dmp family_raccoon_v1 behavioral2/memory/3256-4-0x0000000000400000-0x00000000023F0000-memory.dmp family_raccoon_v1 behavioral2/memory/3256-7-0x00000000024C0000-0x000000000254F000-memory.dmp family_raccoon_v1