Analysis
-
max time kernel
290s -
max time network
255s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
02-05-2024 06:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
300 seconds
General
-
Target
9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe
-
Size
5.0MB
-
MD5
b4926c1f9ec05712ead0e969eaf01357
-
SHA1
dc1987188b7ba0ab40272cffb0ed34023b36b710
-
SHA256
9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402
-
SHA512
12ef165f6a475402292dfbfabb76e1afe34d748d00dd7d6c41058d287305cc66e6354b371332ee5348709dd889d5e5bf3cad81ed1860c7ad7e9a6b34a3ead424
-
SSDEEP
98304:9E2M430Xb5Ur+IfLIZzM+7NOVZkF0kWFa3WnkWGxgZm+jzWBk0:K22XbFIcZjgC9jvLIzWi0
Malware Config
Signatures
-
Raccoon Stealer V2 payload 3 IoCs
resource yara_rule behavioral2/memory/2896-26-0x0000000000400000-0x0000000000E18000-memory.dmp family_raccoon_v2 behavioral2/memory/2896-29-0x0000000000400000-0x0000000000E18000-memory.dmp family_raccoon_v2 behavioral2/memory/2896-31-0x0000000000400000-0x0000000000E18000-memory.dmp family_raccoon_v2 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2896 9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe 2896 9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe 2896 9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe 2896 9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe 2896 9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe 2896 9b6a1d1a00ddd716e344cc64e5592291bb2eb2f5d36a95a32a7b2bddd02a1402.exe