Behavioral task
behavioral1
Sample
9404929845586143f7710859d67216667f08d2e8e8013959b62fe5ac2cd55014.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9404929845586143f7710859d67216667f08d2e8e8013959b62fe5ac2cd55014.exe
Resource
win10v2004-20240704-en
General
-
Target
9404929845586143f7710859d67216667f08d2e8e8013959b62fe5ac2cd55014.exe
-
Size
80KB
-
MD5
8d409ba9c06489f7f77cf6c6e07609c4
-
SHA1
2d27b34bd9f05584b8200bfbc081c75b11ad127c
-
SHA256
9404929845586143f7710859d67216667f08d2e8e8013959b62fe5ac2cd55014
-
SHA512
3817654ecf6dd09b9381b25625fd62d75e3cb3cb62cdbebc0d42b22e4c22f64a86ee7c9add805c09bf102ec0a4356624a4284675d9ba0b842c7c7ecd22ba4411
-
SSDEEP
1536:KX0PI6ORWFPekAZZ0XCkSBIPV1Fn1p06QcKUp3dFqH:9PI6GWpeVsXCLMrxbQOpNFqH
Malware Config
Extracted
raccoon
bbbec09fb70501082e2a2e9916afbab0
http://5.181.159.42:80
-
user_agent
MrBidenNeverKnow
Signatures
-
Raccoon Stealer V2 payload 1 IoCs
resource yara_rule sample family_raccoon_v2 -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9404929845586143f7710859d67216667f08d2e8e8013959b62fe5ac2cd55014.exe
Files
-
9404929845586143f7710859d67216667f08d2e8e8013959b62fe5ac2cd55014.exe.exe windows:6 windows x86 arch:x86
52fcc5c1bcda70fa4759c08995c5a5fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
ReleaseSemaphore
OutputDebugStringA
FindClose
CreateMutexA
LocalAlloc
ReleaseMutex
CancelWaitableTimer
GetLastError
GetProcAddress
CloseHandle
ResetEvent
CreateWaitableTimerA
LocalFree
SetEnvironmentVariableA
CreateFileMappingW
CreateSemaphoreA
CreateEventA
lstrlenA
SetEvent
LoadLibraryA
advapi32
RegOpenKeyExA
ole32
CoInitialize
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE