Behavioral task
behavioral1
Sample
1084-12-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1084-12-0x0000000000400000-0x0000000000416000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
1084-12-0x0000000000400000-0x0000000000416000-memory.dmp
-
Size
88KB
-
MD5
148f96215d7240745ae95f99c39b6a4c
-
SHA1
c2991045981d29486f3d0805db979ae6a4fe4945
-
SHA256
c9df15e161613551c9387f4210cb0c2557a6f9f6a5a03b53b990149681dc9471
-
SHA512
7acd8226bd29613d3c7928659b65fe3b28d8c6242c8126268b9340e58f0ae4551110e5c8f86d75e56a85bdb3ab2eff0df5bb675d5935a070196440487dd8e9de
-
SSDEEP
1536:KX0PI6ORWFPekAZZ0XCkSBIPV1Fn1p06QcjUp3fFqH:9PI6GWpeVsXCLMrxbQxpPFqH
Malware Config
Extracted
raccoon
2ca5558c9ec8037d24a611513d7bd076
https://192.153.57.177:80
-
user_agent
MrBidenNeverKnow
Signatures
-
Raccoon Stealer V2 payload 1 IoCs
Processes:
resource yara_rule sample family_raccoon_v2 -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1084-12-0x0000000000400000-0x0000000000416000-memory.dmp
Files
-
1084-12-0x0000000000400000-0x0000000000416000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE