Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 22:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
KMS Tools Unpack.exe
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
General
-
Target
KMS Tools Unpack.exe
-
Size
444.9MB
-
MD5
990c2776648f18807d529dac58b72389
-
SHA1
866a20d4a4d49a50e09c2ffee39c96f09fd7ee73
-
SHA256
24283a726bd7eb1f2d0c9dce37f2e05160adf6f4830d6d4a9ecc985ec03df65b
-
SHA512
daf45dac2b1a78b8bc6a79d1a06c3b8ae2d43a78a4c61d12a9c3b9b0bec60828bd7d1352b6cefb46b6b5cc126a99485a16a0e29b352e5dda9ba747cb3c0383da
-
SSDEEP
6144:RFPK/bLjYIc9pxyN90vElTvWChzlS41R9d:RFC/f8y90svN/S2R9d
Score
10/10
Malware Config
Extracted
Family
raccoon
Botnet
dd188c0be5001b2c8fb76d74174694cd
C2
http://147.45.44.25:80/
http://85.28.47.116:80/
Attributes
-
user_agent
MrBidenNeverKnow
xor.plain
Signatures
-
Raccoon Stealer V2 payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2388-0-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral1/memory/2388-1-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2