en_raccoon_stealer_technical_analysis_report.pdf Archived: 2026-04-05 17:16:31 UTC Sida 2 av 28 i Contents CONTENTS.........................................................................................................................................................İ PREVİEW .......................................................................................................................................................... 1 UHSSVC.PIF.EXE ANALYSIS ............................................................................................................................... 2 STATIC ANALYSIS ..................................................................................................................................................... 2 DYNAMIC ANALYSIS ................................................................................................................................................. 4 STAGE 2 ANALYSIS............................................................................................................................................ 5 STATIC ANALYSIS ..................................................................................................................................................... 5 DYNAMIC ANALYSIS ................................................................................................................................................. 8 UNPACKING PROCESS ............................................................................................................................................... 9 INSTALLUTIL.EXE ANALYSIS ............................................................................................................................ 10 STATIC ANALYSIS ................................................................................................................................................... 10 DYNAMIC ANALYSIS ............................................................................................................................................... 11 SQL QUERY.......................................................................................................................................................... 17 NETWORK ANALYSIS............................................................................................................................................... 18 https://drive.google.com/file/d/13HEi9Px8V583sRkUG4Syawuw5qwU-W9Q/view Page 1 of 2 FINALLY ............................................................................................................................................................... 20 YARA RULE ..................................................................................................................................................... 22 MITRE ATTACK TABLE..................................................................................................................................... 25 SOLUTION OFFERS.......................................................................................................................................... 25 PREPARED BY ................................................................................................................................................. 26 Source: https://drive.google.com/file/d/13HEi9Px8V583sRkUG4Syawuw5qwU-W9Q/view https://drive.google.com/file/d/13HEi9Px8V583sRkUG4Syawuw5qwU-W9Q/view Page 2 of 2