Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 23:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fdea2c67ea2b128439e022de96b55831_JaffaCakes118.exe
Resource
win7-20240215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
fdea2c67ea2b128439e022de96b55831_JaffaCakes118.exe
-
Size
583KB
-
MD5
fdea2c67ea2b128439e022de96b55831
-
SHA1
dde8a53f784aef73d8cff97bcbb96983648abc37
-
SHA256
c95971379094212f9a7378869108b0d66da31fbd0b38ca2f8f3191244b40578c
-
SHA512
e35664e31b66ce2f4596a63e1ba52b7e1947d0b7bb9e98c06ad44e1f8e52158ae1930b8553780891f4f3f675f738f8e991dfb6db88adc85511394a669ccb6f5c
-
SSDEEP
12288:SEtWSuzDh44+zlHeCcSi+SEICF4dhCddbT/laM5YjK3qcRdWr82TTap3yS11kR:STvzVFmeCs+jWdhgdbMM5YjjcITTaptu
Malware Config
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/1540-2-0x0000000002530000-0x00000000025BE000-memory.dmp family_raccoon_v1 behavioral2/memory/1540-3-0x0000000000400000-0x00000000007C3000-memory.dmp family_raccoon_v1 behavioral2/memory/1540-6-0x0000000002530000-0x00000000025BE000-memory.dmp family_raccoon_v1 behavioral2/memory/1540-13-0x0000000000400000-0x00000000007C3000-memory.dmp family_raccoon_v1