Start
Behavioral task
behavioral1
Sample
b6b131b84985376e265d3331860b0c36432ef06e2123cfa16a7daa08fae16d03.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b6b131b84985376e265d3331860b0c36432ef06e2123cfa16a7daa08fae16d03.dll
Resource
win10v2004-20241007-en
General
-
Target
b6b131b84985376e265d3331860b0c36432ef06e2123cfa16a7daa08fae16d03
-
Size
568KB
-
MD5
5de2e3364f14ea8005eb79a9ccf4abf4
-
SHA1
6820bc1deab231e58c8210de9c72bf29a70d60c4
-
SHA256
b6b131b84985376e265d3331860b0c36432ef06e2123cfa16a7daa08fae16d03
-
SHA512
a59f887a62274f465157fd5c20940d453caa42f3faedda6daf2facc73eb39495e3e904ac595494faf9cdbf8421552a68ba16c9b7b9dfc74de5ec03af2df24d56
-
SSDEEP
12288:nE+xtRkFD3VOyvXHl4V06VTNcWCFzN+s61SHvFqpkGcS+Th77:nE+xtRED3Vd4V06FLCF8+hQoh7
Malware Config
Extracted
raccoon
Signatures
-
Raccoon Stealer V1 payload 1 IoCs
resource yara_rule sample family_raccoon_v1 -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6b131b84985376e265d3331860b0c36432ef06e2123cfa16a7daa08fae16d03
Files
-
b6b131b84985376e265d3331860b0c36432ef06e2123cfa16a7daa08fae16d03.dll windows:6 windows x86 arch:x86
3088a336617802055bd2c5ce6245c8b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetLastError
DeleteFileA
HeapAlloc
lstrcpynA
lstrcmpiW
GetModuleFileNameA
GetCurrentProcess
GetSystemPowerStatus
CreateMutexA
OpenProcess
CreateToolhelp32Snapshot
MultiByteToWideChar
GetSystemWow64DirectoryW
GetTimeZoneInformation
OpenMutexA
Process32NextW
GlobalAlloc
lstrcpyA
Process32FirstW
GlobalFree
GetSystemInfo
GetLogicalDriveStringsA
GlobalMemoryStatusEx
WideCharToMultiByte
WriteFile
GetComputerNameA
SetFileTime
SetFilePointer
GetCurrentDirectoryA
LocalFileTimeToFileTime
GetFileAttributesA
SystemTimeToFileTime
CreateDirectoryA
UnmapViewOfFile
GetFileInformationByHandle
SetCurrentDirectoryA
GetLocalTime
CreateFileMappingA
MapViewOfFile
GetTickCount
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
HeapReAlloc
lstrcpyW
lstrcatW
GetVersionExW
lstrlenW
GetFileSize
CloseHandle
CreateFileA
CreateProcessA
ReadFile
FindClose
GetDriveTypeA
CopyFileTransactedA
CreateThread
GetUserDefaultLCID
RemoveDirectoryTransactedA
Sleep
GetLocaleInfoA
GetModuleHandleA
WaitForSingleObject
GetEnvironmentVariableA
lstrlenA
FreeLibrary
GetProcessHeap
LocalFree
GetProcAddress
LoadLibraryA
LocalAlloc
DeleteFileTransactedA
SetEnvironmentVariableW
OutputDebugStringW
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
HeapSize
GetFileSizeEx
WriteConsoleW
GetModuleFileNameW
GetFileType
GetStdHandle
GetModuleHandleExW
HeapFree
FileTimeToSystemTime
CreateDirectoryTransactedA
ExitProcess
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
InterlockedFlushSList
RaiseException
RtlUnwind
TerminateProcess
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetCPInfo
SetCurrentDirectoryW
CreateDirectoryW
CreateFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
SetEndOfFile
SetFilePointerEx
AreFileApisANSI
DeviceIoControl
CopyFileW
CreateHardLinkW
GetFileInformationByHandleEx
CreateSymbolicLinkW
FormatMessageA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
user32
GetWindowRect
GetSystemMetrics
EnumDisplayDevicesA
wsprintfA
GetWindowDC
GetDesktopWindow
wsprintfW
gdi32
BitBlt
SaveDC
SelectObject
CreateDIBSection
CreateCompatibleDC
GetDeviceCaps
DeleteDC
RestoreDC
DeleteObject
advapi32
GetTokenInformation
CryptGetHashParam
CryptDestroyHash
RegQueryValueExA
GetUserNameA
CreateProcessWithTokenW
OpenProcessToken
RegOpenKeyExA
ConvertSidToStringSidW
DuplicateTokenEx
RegQueryValueExW
CryptReleaseContext
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
CryptAcquireContextA
CredEnumerateW
CredFree
CryptCreateHash
CryptHashData
shell32
ShellExecuteA
SHGetSpecialFolderPathW
SHGetFolderPathA
ole32
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
userenv
GetUserProfileDirectoryA
ktmw32
RollbackTransaction
CreateTransaction
CommitTransaction
bcrypt
BCryptDecrypt
BCryptDestroyKey
BCryptSetProperty
BCryptOpenAlgorithmProvider
BCryptGenerateSymmetricKey
BCryptCloseAlgorithmProvider
crypt32
CryptStringToBinaryA
CryptUnprotectData
winhttp
WinHttpReadData
WinHttpOpenRequest
WinHttpSetOption
WinHttpCloseHandle
WinHttpSendRequest
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpReceiveResponse
gdiplus
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdiplusStartup
GdiplusShutdown
GdipGetImageEncoders
GdipCloneImage
GdipAlloc
GdipGetImageEncodersSize
GdipSaveImageToFile
GdipFree
shlwapi
StrToIntA
StrCmpNW
StrStrIW
Exports
Exports
Sections
.text Size: 425KB - Virtual size: 425KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ