Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 18:49
Static task
static1
Behavioral task
behavioral1
Sample
0e8509172356d527eac4b14a90bbb8d541625884f720b88e902fc88e30d007bc.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0e8509172356d527eac4b14a90bbb8d541625884f720b88e902fc88e30d007bc.exe
Resource
win10v2004-20240412-en
General
-
Target
0e8509172356d527eac4b14a90bbb8d541625884f720b88e902fc88e30d007bc.exe
-
Size
337KB
-
MD5
eaafa70d95f1ac8d0ba678002c316870
-
SHA1
f716edc6c1897549c86a82ca763ce4b04224d5ea
-
SHA256
0e8509172356d527eac4b14a90bbb8d541625884f720b88e902fc88e30d007bc
-
SHA512
01d70885d95132a292c6cbabb0a2dc4517cc7e1821bad6adbb5ddd9ba1cbcfbf71addbf0974792797202dd49230a22bf19b7af93c98feec78bc3bb59c5e16004
-
SSDEEP
3072:ZdF2c/3qO8qQDzNbR8tYZm597CbWSCPvKXw/Z/c8p3o:LF2s3z8qQVtYYM5tCbteiA/B
Malware Config
Extracted
raccoon
1b186ec3b9bf16462aab87ee1bbfe070
http://193.27.14.212:80
-
user_agent
SunShineMoonLight
Signatures
-
Raccoon Stealer V2 payload 3 IoCs
resource yara_rule behavioral1/memory/1660-2-0x0000000000220000-0x000000000023A000-memory.dmp family_raccoon_v2 behavioral1/memory/1660-3-0x0000000000400000-0x00000000025A7000-memory.dmp family_raccoon_v2 behavioral1/memory/1660-4-0x0000000000400000-0x00000000025A7000-memory.dmp family_raccoon_v2 -
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 2 IoCs
resource yara_rule behavioral1/memory/1660-3-0x0000000000400000-0x00000000025A7000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore behavioral1/memory/1660-4-0x0000000000400000-0x00000000025A7000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore