Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 09:59
Static task
static1
Behavioral task
behavioral1
Sample
f33f4b166018011971f9ea6924cd4981_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f33f4b166018011971f9ea6924cd4981_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f33f4b166018011971f9ea6924cd4981_JaffaCakes118.exe
-
Size
612KB
-
MD5
f33f4b166018011971f9ea6924cd4981
-
SHA1
9c91cc6f49c7fa61966ddae70cbf3bb4a7cfc8db
-
SHA256
a888070ad81fa157ad118404c238a5d5e8b0177804abe9a422b56a6c55d415e2
-
SHA512
e7c28d0c64b1bd47d44ae387711beba33d7ee43939e13bd77fa07efd559b2fe678857de1937c7ddc7bec2924721ba44985fa9dc07c9376e8f0a46567c91b0765
-
SSDEEP
12288:+YfFGaFSTieKcnmzEECkgkkFxiQBydaikocqwd/9XvK5XsowPs:pFG2LcmYEClJ9wd6ocqwd/9XvKJOk
Malware Config
Extracted
raccoon
1.7.3
ea1790c1bba6667b84b216a6c88d10e5bafdca86
-
url4cnc
https://tttttt.me/jdiamond13
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/4344-2-0x00000000022D0000-0x0000000002361000-memory.dmp family_raccoon_v1 behavioral2/memory/4344-3-0x0000000000400000-0x00000000004A2000-memory.dmp family_raccoon_v1 behavioral2/memory/4344-4-0x0000000000400000-0x00000000004A2000-memory.dmp family_raccoon_v1 behavioral2/memory/4344-7-0x00000000022D0000-0x0000000002361000-memory.dmp family_raccoon_v1