Analysis
-
max time kernel
291s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
02-05-2024 06:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
87ba028eeb38b0d4e98f021c9c2d456306237050acd232b9bfaecf50979deb2d.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
300 seconds
General
-
Target
87ba028eeb38b0d4e98f021c9c2d456306237050acd232b9bfaecf50979deb2d.exe
-
Size
3.8MB
-
MD5
dc00582614832bb3bc6940be5383858f
-
SHA1
1b3e6eaef63dd480ab86a5c9aef8aca8d70d0029
-
SHA256
87ba028eeb38b0d4e98f021c9c2d456306237050acd232b9bfaecf50979deb2d
-
SHA512
6d928601ae2412e074659875352efa2d2b72997d793e1c5d25103a5533629cf63fa050d2b46643c1154091a143a66e75166c3b207193f133bfc0806daab6beea
-
SSDEEP
98304:p+VStoE1ZwxvEpK4EcIBb/7P1cLxU3L1vKa/tpoBt8NreG7p:cVSNZMvEp5MBn1cLxKL1ilQrd7
Malware Config
Signatures
-
Raccoon Stealer V2 payload 3 IoCs
resource yara_rule behavioral2/memory/1012-13-0x0000000000400000-0x0000000000B31000-memory.dmp family_raccoon_v2 behavioral2/memory/1012-15-0x0000000000400000-0x0000000000B31000-memory.dmp family_raccoon_v2 behavioral2/memory/1012-18-0x0000000000400000-0x0000000000B31000-memory.dmp family_raccoon_v2 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1012 87ba028eeb38b0d4e98f021c9c2d456306237050acd232b9bfaecf50979deb2d.exe 1012 87ba028eeb38b0d4e98f021c9c2d456306237050acd232b9bfaecf50979deb2d.exe 1012 87ba028eeb38b0d4e98f021c9c2d456306237050acd232b9bfaecf50979deb2d.exe 1012 87ba028eeb38b0d4e98f021c9c2d456306237050acd232b9bfaecf50979deb2d.exe