Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
2049ea349d3447edc2dcb38abc52b8c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2049ea349d3447edc2dcb38abc52b8c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
2049ea349d3447edc2dcb38abc52b8c0N.exe
-
Size
339KB
-
MD5
2049ea349d3447edc2dcb38abc52b8c0
-
SHA1
96e1da2cd9d9118acd037414be94b1674c16821f
-
SHA256
105337b8fc4e73342f088682defad087131a6c207d2c06258052c1a80247f9ba
-
SHA512
9ca1ec4393fb8b42dbfeec918a58b3ce2a553ea634677eb3f9c2c4ef121d07d44fb477947ccfc7a2a29c389fd7f5b8ad8566cf066dcf7d5c55d98fbd30654639
-
SSDEEP
6144:J6vmlLvL/ezJnHRljTqUDi93S5dEOPZElnyHSMJY:J6vmlX/oxlHqUDixS5dEOkTMJ
Malware Config
Extracted
raccoon
64b445f2d85b7aeb3d5c7b23112d6ac3
http://45.15.156.209/
-
user_agent
23591
Signatures
-
Raccoon Stealer V2 payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2180-1-0x0000000000400000-0x000000000045B000-memory.dmp family_raccoon_v2 behavioral1/memory/2180-3-0x0000000000400000-0x000000000041E000-memory.dmp family_raccoon_v2 behavioral1/memory/2180-4-0x0000000000220000-0x000000000023C000-memory.dmp family_raccoon_v2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2049ea349d3447edc2dcb38abc52b8c0N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2049ea349d3447edc2dcb38abc52b8c0N.exe