Behavioral task
behavioral1
Sample
3ac063168ba26f0dc295919b9ef0d739.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ac063168ba26f0dc295919b9ef0d739.exe
Resource
win10v2004-20240802-en
General
-
Target
3ac063168ba26f0dc295919b9ef0d739.virus
-
Size
80KB
-
MD5
3ac063168ba26f0dc295919b9ef0d739
-
SHA1
03a04db4b54a80977821eedc6b89833aaf9f34ff
-
SHA256
2b150f072b956777a4565dda14deb3d8aae7eb9957b19e595c534aec409a247d
-
SHA512
d2219a8dbfe1029d1b1d597c1023d09bb654ed3b977afd9a4a87cf52e71b94833d1eb87ad3741584b44b803958c7e642ee4843ae0b59a378b093829bb15bd1bd
-
SSDEEP
1536:KX0PI6ORWFPekAZZ0XCkSBIPV1Fn1p06QcKUp39FqH:9PI6GWpeVsXCLMrxbQOptFqH
Malware Config
Extracted
raccoon
a34699aa4f6efb97502fddc7f7697162
http://65.38.120.100:80
-
user_agent
MrBidenNeverKnow
Signatures
-
Raccoon Stealer V2 payload 1 IoCs
Processes:
resource yara_rule sample family_raccoon_v2 -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3ac063168ba26f0dc295919b9ef0d739.virus
Files
-
3ac063168ba26f0dc295919b9ef0d739.virus.exe windows:6 windows x86 arch:x86
52fcc5c1bcda70fa4759c08995c5a5fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
ReleaseSemaphore
OutputDebugStringA
FindClose
CreateMutexA
LocalAlloc
ReleaseMutex
CancelWaitableTimer
GetLastError
GetProcAddress
CloseHandle
ResetEvent
CreateWaitableTimerA
LocalFree
SetEnvironmentVariableA
CreateFileMappingW
CreateSemaphoreA
CreateEventA
lstrlenA
SetEvent
LoadLibraryA
advapi32
RegOpenKeyExA
ole32
CoInitialize
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE