Analysis Overview
score
10/10
SHA256
982a0d1b819db754da8d7b33ec3ce845594e3efaddcc77047664243edd9fb329
Threat Level: Known bad
The file su00.exe was found to be: Known bad.
Malicious Activity Summary
Raccoon Stealer V2 payload
Raccoon family
Unsigned PE
System Location Discovery: System Language Discovery
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-09-23 08:10
Signatures
Raccoon Stealer V2 payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Raccoon family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-09-23 08:10
Reported
2024-09-23 08:13
Platform
win11-20240802-en
Max time kernel
92s
Max time network
95s
Command Line
"C:\Users\Admin\AppData\Local\Temp\su00.exe"
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\su00.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\su00.exe
"C:\Users\Admin\AppData\Local\Temp\su00.exe"
Network
| Country | Destination | Domain | Proto |
| DE | 83.217.11.34:80 | tcp | |
| DE | 83.217.11.35:80 | tcp |
Files
N/A