Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 08:13
Static task
static1
Behavioral task
behavioral1
Sample
0ab67243ca42ce8ac4d32e53b4859d9f8eedef1144a81a40f067042684385742.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ab67243ca42ce8ac4d32e53b4859d9f8eedef1144a81a40f067042684385742.exe
Resource
win10v2004-20240802-en
General
-
Target
0ab67243ca42ce8ac4d32e53b4859d9f8eedef1144a81a40f067042684385742.exe
-
Size
539KB
-
MD5
b313a4a31923cad9ea905204a2288f65
-
SHA1
bd6fe1ccb9c3a83aae61c6d1a78ced5a76de94ba
-
SHA256
0ab67243ca42ce8ac4d32e53b4859d9f8eedef1144a81a40f067042684385742
-
SHA512
7891992ed3d304620eaac012f7d770bb3abb808b39696317ade30099e7cb2246396c7d3077df084908adc58e9ddbf4b39d9b435e1425a50a37e49e6cc4b05c01
-
SSDEEP
12288:i9qNOcEzJWJHFUrPQwqYdv+qW/kBWXgD1EtbZkRD8wZGEX8cA0/M:cTTWJHFatdvpkuWXu1EgXsEv
Malware Config
Extracted
raccoon
505a13d44aea894153998a2e1d76f9fb5b457c72
-
url4cnc
http://telegka.top/jjbadb0y
http://telegin.top/jjbadb0y
https://t.me/jjbadb0y
Signatures
-
Raccoon Stealer V1 payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1372-2-0x0000000004C80000-0x0000000004D0E000-memory.dmp family_raccoon_v1 behavioral2/memory/1372-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/1372-5-0x0000000000400000-0x0000000002F4E000-memory.dmp family_raccoon_v1 behavioral2/memory/1372-6-0x0000000004C80000-0x0000000004D0E000-memory.dmp family_raccoon_v1 behavioral2/memory/1372-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/1372-12-0x0000000000400000-0x0000000002F4E000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0ab67243ca42ce8ac4d32e53b4859d9f8eedef1144a81a40f067042684385742.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ab67243ca42ce8ac4d32e53b4859d9f8eedef1144a81a40f067042684385742.exe