Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 07:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f9d64d21cc1354362e794509126aecb1_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
f9d64d21cc1354362e794509126aecb1_JaffaCakes118.exe
-
Size
522KB
-
MD5
f9d64d21cc1354362e794509126aecb1
-
SHA1
e1a8bbfcef9ef62b83f27211ff38ad1e7ef26478
-
SHA256
cd9ccc34c800028f931499a2f193911065ce24e92f070964c6b0e107befcb8ed
-
SHA512
1cbacae025ad715d553326162c9af31178e379b114dbce74dd36142a59a2da27d56bc885b76d38f4773b5b9fa20dba2c7a4af8da429f99814a5fa84a6358f476
-
SSDEEP
12288:aDfpPDamgQDvbvHgbqBuuQs5C5LzpPWBp65yaQt:aRDTgy6DSs5LzpK65rQt
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/1812-2-0x0000000004040000-0x00000000040CF000-memory.dmp family_raccoon_v1 behavioral2/memory/1812-3-0x0000000000400000-0x00000000023ED000-memory.dmp family_raccoon_v1 behavioral2/memory/1812-4-0x0000000000400000-0x00000000023ED000-memory.dmp family_raccoon_v1 behavioral2/memory/1812-7-0x0000000004040000-0x00000000040CF000-memory.dmp family_raccoon_v1