Behavioral task
behavioral1
Sample
194620476ff575534a3cc834440963ff8682307a.exe
Resource
win7-20241010-en
General
-
Target
194620476ff575534a3cc834440963ff8682307a.rl
-
Size
80KB
-
MD5
75cc82d3cf334c82ac92d55e34459f92
-
SHA1
194620476ff575534a3cc834440963ff8682307a
-
SHA256
6bd19bc9223d33208733d5cc07f89bf2943210933424018afa6c2d2e2949811d
-
SHA512
3994542ed0358a16423839873b292439a0a506aadc4d5acdd884cf76bdcecf30fb1eb093bf67d8c86928392031a317e546c853de1a6f607fe3444dd961f717e1
-
SSDEEP
1536:KX0PI6ORWFPekAZZ0XCkSBIPV1Fn1p06QcKUp3QFqH:9PI6GWpeVsXCLMrxbQOpAFqH
Malware Config
Extracted
raccoon
970bd7b21ef58eba844bcc1b35da559a
http://193.187.174.250:80/
http://176.113.115.103:80/
-
user_agent
MrBidenNeverKnow
Signatures
-
Raccoon Stealer V2 payload 1 IoCs
resource yara_rule sample family_raccoon_v2 -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 194620476ff575534a3cc834440963ff8682307a.rl
Files
-
194620476ff575534a3cc834440963ff8682307a.rl.exe windows:6 windows x86 arch:x86
52fcc5c1bcda70fa4759c08995c5a5fb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
ReleaseSemaphore
OutputDebugStringA
FindClose
CreateMutexA
LocalAlloc
ReleaseMutex
CancelWaitableTimer
GetLastError
GetProcAddress
CloseHandle
ResetEvent
CreateWaitableTimerA
LocalFree
SetEnvironmentVariableA
CreateFileMappingW
CreateSemaphoreA
CreateEventA
lstrlenA
SetEvent
LoadLibraryA
advapi32
RegOpenKeyExA
ole32
CoInitialize
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE