Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 13:13
Static task
static1
Behavioral task
behavioral1
Sample
49e8ce609bb6605ec1bd6536bc16269f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
49e8ce609bb6605ec1bd6536bc16269f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
49e8ce609bb6605ec1bd6536bc16269f_JaffaCakes118.exe
-
Size
549KB
-
MD5
49e8ce609bb6605ec1bd6536bc16269f
-
SHA1
28f6533ad77117c4da410b204fb59c33feb463c7
-
SHA256
ae6f4381fdebabb3b0935106f1196bd301a9ec840f79d2668f64d19355041a8c
-
SHA512
492e1d61fe6e1ce511ac95e3ac606f0d0ba44ee02bb75ed09ecb0139e444ef19dcafd4e9302743fbf8da229d248b3d612e2618d0fb803c31e85f2d4c317ce026
-
SSDEEP
12288:UbIWJO4rDwVKc+ySub9/SG6Gzlag7ltHvQgvbNQngRCc7:zmRD4Z+yf5/SxOag7ltHVqgIe
Malware Config
Extracted
raccoon
1.7.2
9ba64f4b6fe448911470a88f09d6e7d5b92ff0ab
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4620-2-0x0000000002630000-0x00000000026C2000-memory.dmp family_raccoon_v1 behavioral2/memory/4620-3-0x0000000000400000-0x0000000000494000-memory.dmp family_raccoon_v1 behavioral2/memory/4620-4-0x0000000000400000-0x00000000008D6000-memory.dmp family_raccoon_v1 behavioral2/memory/4620-7-0x0000000002630000-0x00000000026C2000-memory.dmp family_raccoon_v1 behavioral2/memory/4620-8-0x0000000000400000-0x0000000000494000-memory.dmp family_raccoon_v1