Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 08:13
Static task
static1
Behavioral task
behavioral1
Sample
0ab67243ca42ce8ac4d32e53b4859d9f8eedef1144a81a40f067042684385742.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ab67243ca42ce8ac4d32e53b4859d9f8eedef1144a81a40f067042684385742.exe
Resource
win10v2004-20240802-en
General
-
Target
0ab67243ca42ce8ac4d32e53b4859d9f8eedef1144a81a40f067042684385742.exe
-
Size
539KB
-
MD5
b313a4a31923cad9ea905204a2288f65
-
SHA1
bd6fe1ccb9c3a83aae61c6d1a78ced5a76de94ba
-
SHA256
0ab67243ca42ce8ac4d32e53b4859d9f8eedef1144a81a40f067042684385742
-
SHA512
7891992ed3d304620eaac012f7d770bb3abb808b39696317ade30099e7cb2246396c7d3077df084908adc58e9ddbf4b39d9b435e1425a50a37e49e6cc4b05c01
-
SSDEEP
12288:i9qNOcEzJWJHFUrPQwqYdv+qW/kBWXgD1EtbZkRD8wZGEX8cA0/M:cTTWJHFatdvpkuWXu1EgXsEv
Malware Config
Signatures
-
Raccoon Stealer V1 payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2448-1-0x0000000000400000-0x0000000002F4E000-memory.dmp family_raccoon_v1 behavioral1/memory/2448-2-0x0000000000400000-0x0000000002F4E000-memory.dmp family_raccoon_v1 behavioral1/memory/2448-10-0x0000000000400000-0x0000000002F4E000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0ab67243ca42ce8ac4d32e53b4859d9f8eedef1144a81a40f067042684385742.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ab67243ca42ce8ac4d32e53b4859d9f8eedef1144a81a40f067042684385742.exe