Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-08-2024 08:15

General

  • Target

    a6e9ff0ac5802746d0033499a2ea05c0N.exe

  • Size

    536KB

  • MD5

    a6e9ff0ac5802746d0033499a2ea05c0

  • SHA1

    8f5549e1830bcfffcd0c48f92ab42a4842165305

  • SHA256

    e28f4be9b30b89b1ecdb67ffaa7f8e5bef97721d3987dc15d0c50b12492d8441

  • SHA512

    28526dae0f04bade085b7a454847adef7f4188c6a1f3e0121153f46eafeb1d10c1174dad43f3244685e94ab447083941212563126ce0ab8cdd8ef89f0710424d

  • SSDEEP

    12288:DuONeZuOSMY3ob+Pxe8SgUEREOJt1c4tyV:KOyk3xe8Sj+EafO

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

8362b362c4d6f7974965de6c95fa26fb8696bec4

Attributes
  • url4cnc

    https://tttttt.me/hbackwoods1

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6e9ff0ac5802746d0033499a2ea05c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a6e9ff0ac5802746d0033499a2ea05c0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2624-1-0x0000000000690000-0x0000000000790000-memory.dmp

    Filesize

    1024KB

  • memory/2624-2-0x0000000002130000-0x00000000021C1000-memory.dmp

    Filesize

    580KB

  • memory/2624-3-0x0000000000400000-0x0000000000492000-memory.dmp

    Filesize

    584KB

  • memory/2624-4-0x0000000000400000-0x0000000000492000-memory.dmp

    Filesize

    584KB

  • memory/2624-6-0x0000000000690000-0x0000000000790000-memory.dmp

    Filesize

    1024KB

  • memory/2624-7-0x0000000002130000-0x00000000021C1000-memory.dmp

    Filesize

    580KB