Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 08:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e14442163aa07516e4a8b242d64df1a8.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
e14442163aa07516e4a8b242d64df1a8.exe
-
Size
493KB
-
MD5
e14442163aa07516e4a8b242d64df1a8
-
SHA1
39a1df5ebe114db8873501eafd06ba5524ff5d7b
-
SHA256
d2ceb877de1be0f55c3a9cdb218ff978066f87ae0caf4ee6bd6401c0272c3b78
-
SHA512
1c9055b3f69a259d6fda2d5d558f16778d4fa49e27a58fb6daca40dc31cf3b348c1fa4faa550077a0e8ab0cf6df3faa53946022c25e54e51aff051852fb2ae73
-
SSDEEP
12288:4cxYOWcLoiuQO0PA3vTWK+PWOVy1szok:dYtcQHhvTWP/VNz
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/3528-2-0x0000000002B90000-0x0000000002C1F000-memory.dmp family_raccoon_v1 behavioral2/memory/3528-3-0x0000000000400000-0x0000000002B86000-memory.dmp family_raccoon_v1 behavioral2/memory/3528-4-0x0000000000400000-0x0000000002B86000-memory.dmp family_raccoon_v1 behavioral2/memory/3528-7-0x0000000002B90000-0x0000000002C1F000-memory.dmp family_raccoon_v1