Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2024 20:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5d424714d38d19494555e2811957c7eb_JaffaCakes118.exe
Resource
win7-20240319-en
2 signatures
150 seconds
General
-
Target
5d424714d38d19494555e2811957c7eb_JaffaCakes118.exe
-
Size
593KB
-
MD5
5d424714d38d19494555e2811957c7eb
-
SHA1
e90633b3e83c025cf5be704de3b442f38b31d775
-
SHA256
5f7c10b1783c28c9b9039c0a84f9aa9ae2fdb698117a66d7ce6775e3952ba616
-
SHA512
b6b10f811923ea0c6178923bfdc0a2b13bc05d9b3d0f7ef60239d32cf7c212a0bf87ad8824b64ea88c14c0c86fffc2f8f179670bf9c954903e7d882b6f8cc99b
-
SSDEEP
12288:ssZJiozLFNwPOdTjRzRbjmvd5F08qM1OR7M906Klsrxfc8u5NXSKr:sSFLHFBU/XUR7F6zc8u5
Malware Config
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral2/memory/4968-2-0x0000000002510000-0x000000000259E000-memory.dmp family_raccoon_v1 behavioral2/memory/4968-3-0x0000000000400000-0x00000000007C6000-memory.dmp family_raccoon_v1 behavioral2/memory/4968-4-0x0000000000400000-0x00000000007C6000-memory.dmp family_raccoon_v1 behavioral2/memory/4968-7-0x0000000002510000-0x000000000259E000-memory.dmp family_raccoon_v1 behavioral2/memory/4968-10-0x0000000000400000-0x00000000007C6000-memory.dmp family_raccoon_v1