{
	"id": "d6274c1f-162c-4011-8eb9-cdbad281202f",
	"created_at": "2026-04-06T00:22:18.828448Z",
	"updated_at": "2026-04-10T03:20:06.086834Z",
	"deleted_at": null,
	"sha1_hash": "0cd28fe79ef6f970b5652d73c6810ab54622f951",
	"title": "en_raccoon_stealer_technical_analysis_report.pdf",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 31616,
	"plain_text": "en_raccoon_stealer_technical_analysis_report.pdf\r\nArchived: 2026-04-05 17:16:31 UTC\r\nSida 2 av 28\r\ni\r\nContents\r\nCONTENTS.........................................................................................................................................................İ\r\nPREVİEW .......................................................................................................................................................... 1\r\nUHSSVC.PIF.EXE ANALYSIS ............................................................................................................................... 2\r\nSTATIC ANALYSIS .....................................................................................................................................................\r\n2\r\nDYNAMIC ANALYSIS\r\n................................................................................................................................................. 4\r\nSTAGE 2 ANALYSIS............................................................................................................................................ 5\r\nSTATIC ANALYSIS .....................................................................................................................................................\r\n5\r\nDYNAMIC ANALYSIS\r\n................................................................................................................................................. 8\r\nUNPACKING PROCESS\r\n............................................................................................................................................... 9\r\nINSTALLUTIL.EXE ANALYSIS ............................................................................................................................\r\n10\r\nSTATIC ANALYSIS ...................................................................................................................................................\r\n10\r\nDYNAMIC ANALYSIS ...............................................................................................................................................\r\n11\r\nSQL QUERY.......................................................................................................................................................... 17\r\nNETWORK ANALYSIS...............................................................................................................................................\r\n18\r\nhttps://drive.google.com/file/d/13HEi9Px8V583sRkUG4Syawuw5qwU-W9Q/view\r\nPage 1 of 2\n\nFINALLY ............................................................................................................................................................... 20\r\nYARA RULE ..................................................................................................................................................... 22\r\nMITRE ATTACK TABLE..................................................................................................................................... 25\r\nSOLUTION OFFERS.......................................................................................................................................... 25\r\nPREPARED BY ................................................................................................................................................. 26\r\nSource: https://drive.google.com/file/d/13HEi9Px8V583sRkUG4Syawuw5qwU-W9Q/view\r\nhttps://drive.google.com/file/d/13HEi9Px8V583sRkUG4Syawuw5qwU-W9Q/view\r\nPage 2 of 2",
	"extraction_quality": 0.8425215393452039,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://drive.google.com/file/d/13HEi9Px8V583sRkUG4Syawuw5qwU-W9Q/view"
	],
	"report_names": [
		"view"
	],
	"threat_actors": [],
	"ts_created_at": 1775434938,
	"ts_updated_at": 1775791206,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/0cd28fe79ef6f970b5652d73c6810ab54622f951.pdf",
		"text": "https://archive.orkl.eu/0cd28fe79ef6f970b5652d73c6810ab54622f951.txt",
		"img": "https://archive.orkl.eu/0cd28fe79ef6f970b5652d73c6810ab54622f951.jpg"
	}
}