Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2024 21:38

General

  • Target

    mixazed_20210808-093225.exe

  • Size

    496KB

  • MD5

    0afc84729688edd256ceb10640273f6e

  • SHA1

    2af9a1faf03609b53f215304ad7a53e902a70278

  • SHA256

    641a192558e576b2fccf9c0d84b97b469cb238f5a179b9c836454af32e82989b

  • SHA512

    6723870e2a8137ec4d73a10d4f8c11de1333114fa5144b54db99e83180ac42e821cac8710cf2a49cbce265705d6103c215c781c2f3cb7e337d54559cd1dadbf4

  • SSDEEP

    12288:njayzJsbBujJSiJduR+ssvE55QK5AK2R0Y:njaQJsbE1uRuE+6Y

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 2 IoCs
  • Raccoon family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\mixazed_20210808-093225.exe
    "C:\Users\Admin\AppData\Local\Temp\mixazed_20210808-093225.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1448-1-0x0000000000400000-0x0000000002CB2000-memory.dmp

    Filesize

    40.7MB

  • memory/1448-2-0x0000000000400000-0x0000000002CB2000-memory.dmp

    Filesize

    40.7MB