Analysis

  • max time kernel
    132s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 10:12

General

  • Target

    2024-09-05_b9602656ba6367338898a6a8f0161297_avoslocker_cobalt-strike_raccoonstealer.exe

  • Size

    564KB

  • MD5

    b9602656ba6367338898a6a8f0161297

  • SHA1

    6984f206839b2b4ae5a3fa508251ee30eb3775c9

  • SHA256

    5caabc9bb7bdcc89451708b1ceaa25bdf2ad6bf569d2425243e0de5acc1d08cc

  • SHA512

    06330f3b38c0e8b029313a8cf6e83af38216089e1333ff2960dc312dc23c78ef00ecb86842a29b046a6fa48c7f0a84cd64473b3e67add25e39658610d6e20f67

  • SSDEEP

    12288:38Malpp/QPcqcGVwwAPfoEQB94Uc1VNzZWPx9YBKZTdb:38dhQEqcGQfoxGVxIPAIRd

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-05_b9602656ba6367338898a6a8f0161297_avoslocker_cobalt-strike_raccoonstealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-05_b9602656ba6367338898a6a8f0161297_avoslocker_cobalt-strike_raccoonstealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads