Analysis
-
max time kernel
292s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 06:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
300 seconds
General
-
Target
9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe
-
Size
5.0MB
-
MD5
b4926c1f9ec05712ead0e969eaf01357
-
SHA1
dc1987188b7ba0ab40272cffb0ed34023b36b710
-
SHA256
9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402
-
SHA512
12ef165f6a475402292dfbfabb76e1afe34d748d00dd7d6c41058d287305cc66e6354b371332ee5348709dd889d5e5bf3cad81ed1860c7ad7e9a6b34a3ead424
-
SSDEEP
98304:9E2M430Xb5Ur+IfLIZzM+7NOVZkF0kWFa3WnkWGxgZm+jzWBk0:K22XbFIcZjgC9jvLIzWi0
Malware Config
Signatures
-
Raccoon Stealer V2 payload 5 IoCs
resource yara_rule behavioral1/memory/2228-114-0x0000000000400000-0x0000000000E18000-memory.dmp family_raccoon_v2 behavioral1/memory/2228-113-0x0000000000400000-0x0000000000E18000-memory.dmp family_raccoon_v2 behavioral1/memory/2228-115-0x0000000000400000-0x0000000000E18000-memory.dmp family_raccoon_v2 behavioral1/memory/2228-116-0x0000000000400000-0x0000000000E18000-memory.dmp family_raccoon_v2 behavioral1/memory/2228-117-0x0000000000400000-0x0000000000E18000-memory.dmp family_raccoon_v2 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2228 9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe 2228 9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe 2228 9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe