Behavioral task
behavioral1
Sample
9404929845586143f7710859d67216667f08d2e8e8013959b62fe5ac2cd55014.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9404929845586143f7710859d67216667f08d2e8e8013959b62fe5ac2cd55014.exe
Resource
win10v2004-20240704-en
General
-
Target
8d409ba9c06489f7f77cf6c6e07609c4.bin
-
Size
36KB
-
MD5
9992a9a8750099b15eb9ec31d8395d92
-
SHA1
157b92198e3b89a105c6cf8b3861c4bff58a20fd
-
SHA256
fdef20dec95a477b317e289f8674b4ab03a4fa73755d8e38557f2cba47a45522
-
SHA512
72ecee8cc3fff0c844f6d815d1012b42b702fc59b3344dd5fd0a2ab9660ac1a7da37765a2afd168e23a9cdc3253faed7ac6e8f08f8007f47ec7f6ba85c05bb0d
-
SSDEEP
768:A2OD58h+201IMSZejapxh8DyqH6ZjVfdgkdINPdG6/XxdUsXDty2ps8lJbAa:AVCX0pS5xKDZH4J+GIJdr/BdUs51i8lj
Malware Config
Extracted
raccoon
bbbec09fb70501082e2a2e9916afbab0
http://5.181.159.42:80
-
user_agent
MrBidenNeverKnow
Signatures
-
Raccoon Stealer V2 payload 1 IoCs
resource yara_rule static1/unpack001/9404929845586143f7710859d67216667f08d2e8e8013959b62fe5ac2cd55014.exe family_raccoon_v2 -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9404929845586143f7710859d67216667f08d2e8e8013959b62fe5ac2cd55014.exe
Files
-
8d409ba9c06489f7f77cf6c6e07609c4.bin.zip
Password: infected
-
9404929845586143f7710859d67216667f08d2e8e8013959b62fe5ac2cd55014.exe.exe windows:6 windows x86 arch:x86
Password: infected
52fcc5c1bcda70fa4759c08995c5a5fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
ReleaseSemaphore
OutputDebugStringA
FindClose
CreateMutexA
LocalAlloc
ReleaseMutex
CancelWaitableTimer
GetLastError
GetProcAddress
CloseHandle
ResetEvent
CreateWaitableTimerA
LocalFree
SetEnvironmentVariableA
CreateFileMappingW
CreateSemaphoreA
CreateEventA
lstrlenA
SetEvent
LoadLibraryA
advapi32
RegOpenKeyExA
ole32
CoInitialize
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE