Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
253f7e52504120823ce8aee26d8947838ef3cf236e4c0c8d0ed6dc2abea03744.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
253f7e52504120823ce8aee26d8947838ef3cf236e4c0c8d0ed6dc2abea03744.exe
Resource
win10v2004-20240802-en
General
-
Target
253f7e52504120823ce8aee26d8947838ef3cf236e4c0c8d0ed6dc2abea03744.exe
-
Size
513KB
-
MD5
4c7e4c18ff36db58ae07ad4e9a440254
-
SHA1
f4a70b79052a40f5ec5e5462ede254ec9bd65faa
-
SHA256
253f7e52504120823ce8aee26d8947838ef3cf236e4c0c8d0ed6dc2abea03744
-
SHA512
b3cb9dad23ada259f7bd7c161011d35e7912d54ff5b82790d44c12f29b899d460e0c4b1300dd94b9c136d52d29d9d781d64cf9b9d41403b551a8120c9ba79bad
-
SSDEEP
12288:bxnAbkAw5bO0vdJxxYh/AIOQKsIb/mRyazLhm2ld:bxAbkJNOqfxYx2AICRyCLz
Malware Config
Extracted
raccoon
1.7.3
6133845276bacfd61da17e544c411895bc725640
-
url4cnc
https://telete.in/jdiamond13
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral2/memory/1316-2-0x0000000004900000-0x0000000004993000-memory.dmp family_raccoon_v1 behavioral2/memory/1316-3-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/1316-6-0x0000000004900000-0x0000000004993000-memory.dmp family_raccoon_v1 behavioral2/memory/1316-5-0x0000000000400000-0x0000000002BC4000-memory.dmp family_raccoon_v1 behavioral2/memory/1316-7-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253f7e52504120823ce8aee26d8947838ef3cf236e4c0c8d0ed6dc2abea03744.exe