Analysis
-
max time kernel
141s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 00:58
Static task
static1
Behavioral task
behavioral1
Sample
75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0.exe
Resource
win10v2004-20240802-en
General
-
Target
75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0.exe
-
Size
539KB
-
MD5
788f45ada2b264a9ea458f7d125571b0
-
SHA1
cc7cbce75f3f0c2e9eeb5c16f3b0cb690aa46aad
-
SHA256
75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0
-
SHA512
7151982e5270c10869a1bbeb8329ec884aff1ec46925fe0bbbe07c70c3c279fe41c48fbf56835fece6341db772fdd98b142dab66d0d84e3f70422906d74de181
-
SSDEEP
12288:cFLz8rA4TmF2Gfhk0AYumXdw/9ZO9gEwZGEX8cA0/M:Sk3TORlAYumXo9ZO9ssEv
Malware Config
Extracted
raccoon
5249862c20af324bd38c0aae0d5ea8e5ac16674d
-
url4cnc
http://telegatt.top/br33smithyou
http://telegka.top/br33smithyou
http://telegin.top/br33smithyou
https://t.me/br33smithyou
Signatures
-
Raccoon Stealer V1 payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2028-2-0x0000000000220000-0x00000000002AE000-memory.dmp family_raccoon_v1 behavioral1/memory/2028-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2028-4-0x0000000000400000-0x0000000002F4E000-memory.dmp family_raccoon_v1 behavioral1/memory/2028-6-0x0000000000220000-0x00000000002AE000-memory.dmp family_raccoon_v1 behavioral1/memory/2028-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2028-17-0x0000000000400000-0x0000000002F4E000-memory.dmp family_raccoon_v1 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0.exe