Analysis
-
max time kernel
115s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
cbba8d8f2addd8e8c8fdb6d0e84daa90N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cbba8d8f2addd8e8c8fdb6d0e84daa90N.exe
Resource
win10v2004-20240802-en
General
-
Target
cbba8d8f2addd8e8c8fdb6d0e84daa90N.exe
-
Size
534KB
-
MD5
cbba8d8f2addd8e8c8fdb6d0e84daa90
-
SHA1
6cdb4fb697d776251f22c6f7d9404d7b1a6ed733
-
SHA256
ff0f17b2d53553f4043579fd6a7c41765bd8e6fc0bd6e90b869582e7df2233a5
-
SHA512
f182c7c66f8271f877c2a44f5bb007e6adf5e18876b13487b148b6ac776c18d18afd6b1a3f91f9e2467dbf8dc565a7cff273f0e9ee27ac493348956e9b43afcc
-
SSDEEP
12288:OCbqLsbMPaVICFnxOY0To5NpNaN28yap0OEZEEl187dpN:vWoNGCFA4PNWpJMEp5
Malware Config
Extracted
raccoon
1.7.3
50f8ded12c46443e43915127b1219ac2fc439bb6
-
url4cnc
https://tttttt.me/mimimimaxormin
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/1320-2-0x0000000002280000-0x0000000002311000-memory.dmp family_raccoon_v1 behavioral2/memory/1320-3-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral2/memory/1320-5-0x0000000000400000-0x0000000000492000-memory.dmp family_raccoon_v1 behavioral2/memory/1320-6-0x0000000002280000-0x0000000002311000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbba8d8f2addd8e8c8fdb6d0e84daa90N.exe