Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0.exe
Resource
win10v2004-20240802-en
General
-
Target
75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0.exe
-
Size
539KB
-
MD5
788f45ada2b264a9ea458f7d125571b0
-
SHA1
cc7cbce75f3f0c2e9eeb5c16f3b0cb690aa46aad
-
SHA256
75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0
-
SHA512
7151982e5270c10869a1bbeb8329ec884aff1ec46925fe0bbbe07c70c3c279fe41c48fbf56835fece6341db772fdd98b142dab66d0d84e3f70422906d74de181
-
SSDEEP
12288:cFLz8rA4TmF2Gfhk0AYumXdw/9ZO9gEwZGEX8cA0/M:Sk3TORlAYumXo9ZO9ssEv
Malware Config
Extracted
raccoon
5249862c20af324bd38c0aae0d5ea8e5ac16674d
-
url4cnc
http://telegatt.top/br33smithyou
http://telegka.top/br33smithyou
http://telegin.top/br33smithyou
https://t.me/br33smithyou
Signatures
-
Raccoon Stealer V1 payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2976-2-0x00000000002D0000-0x000000000035E000-memory.dmp family_raccoon_v1 behavioral1/memory/2976-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2976-5-0x0000000000400000-0x0000000002F4E000-memory.dmp family_raccoon_v1 behavioral1/memory/2976-6-0x00000000002D0000-0x000000000035E000-memory.dmp family_raccoon_v1 behavioral1/memory/2976-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2976-17-0x0000000000400000-0x0000000002F4E000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0.exe