Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
0203ee4a4252b78a17796e7e4832dcfb921051b87e4a727eae172ea13d9424cd.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0203ee4a4252b78a17796e7e4832dcfb921051b87e4a727eae172ea13d9424cd.exe
Resource
win10v2004-20240419-en
General
-
Target
0203ee4a4252b78a17796e7e4832dcfb921051b87e4a727eae172ea13d9424cd.exe
-
Size
6.7MB
-
MD5
94bda0c9325b4655f5d422092b7e685f
-
SHA1
5440a1d577194fb53cef821008853eabf77c4b5a
-
SHA256
0203ee4a4252b78a17796e7e4832dcfb921051b87e4a727eae172ea13d9424cd
-
SHA512
5e7bc7414074abec96a43b2bd5d0533491780ccff9303be26bcd3e25c7cb3faf1e05669ccb63c7808f6f7fd69ee90f5d46be770a870bb194b79be5c9b42f3243
-
SSDEEP
196608:Sp460oG0zsP9fCoHMk79G/acvXVTLSNK:W454zswoZG/VTL
Malware Config
Extracted
raccoon
d6963f7081d7100d9b653c14683abd5e
http://185.25.51.5
http://185.25.51.6
http://213.252.244.5
-
user_agent
23591
Signatures
-
Raccoon Stealer V2 payload 4 IoCs
resource yara_rule behavioral2/memory/5244-3-0x0000000000400000-0x0000000000E65000-memory.dmp family_raccoon_v2 behavioral2/memory/5244-5-0x0000000000400000-0x0000000000E65000-memory.dmp family_raccoon_v2 behavioral2/memory/5244-7-0x0000000000400000-0x0000000000E65000-memory.dmp family_raccoon_v2 behavioral2/memory/5244-8-0x0000000000400000-0x0000000000E65000-memory.dmp family_raccoon_v2 -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5244 0203ee4a4252b78a17796e7e4832dcfb921051b87e4a727eae172ea13d9424cd.exe 5244 0203ee4a4252b78a17796e7e4832dcfb921051b87e4a727eae172ea13d9424cd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5244 0203ee4a4252b78a17796e7e4832dcfb921051b87e4a727eae172ea13d9424cd.exe 5244 0203ee4a4252b78a17796e7e4832dcfb921051b87e4a727eae172ea13d9424cd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0203ee4a4252b78a17796e7e4832dcfb921051b87e4a727eae172ea13d9424cd.exe"C:\Users\Admin\AppData\Local\Temp\0203ee4a4252b78a17796e7e4832dcfb921051b87e4a727eae172ea13d9424cd.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5244