Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 05:21
Static task
static1
Behavioral task
behavioral1
Sample
4e4122121f0f3a009416fbd1f98583d0dda1cfd6b1d56e1a8f8b160626004a9f.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
4e4122121f0f3a009416fbd1f98583d0dda1cfd6b1d56e1a8f8b160626004a9f.exe
Resource
win10v2004-20241007-en
General
-
Target
4e4122121f0f3a009416fbd1f98583d0dda1cfd6b1d56e1a8f8b160626004a9f.exe
-
Size
512KB
-
MD5
1a7dea0d24ce41cde8fcf84824aa3c41
-
SHA1
ca74c948d601facb6804d2d57ecb8aec2be23be5
-
SHA256
4e4122121f0f3a009416fbd1f98583d0dda1cfd6b1d56e1a8f8b160626004a9f
-
SHA512
a4a21a75bb046795859f9b16e94cfab1561fd69165c1eecf1b193a46aa54a895ee01c4b9c84228fc3b62e86b0b1fd537c50412e5c0a93d1fb933f48fe6bff197
-
SSDEEP
12288:oDykdg0C7FpRIRfxzl72hef1vDs6ob0fqMcjgSunrCAb6nk/:oekdu7NIR9whef1vDRVSVerOk/
Malware Config
Extracted
raccoon
7ebf9b416b72a203df65383eec899dc689d2c3d7
-
url4cnc
http://telegatt.top/agrybirdsgamerept
http://telegka.top/agrybirdsgamerept
http://telegin.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2084-2-0x00000000002B0000-0x000000000033E000-memory.dmp family_raccoon_v1 behavioral1/memory/2084-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2084-6-0x00000000002B0000-0x000000000033E000-memory.dmp family_raccoon_v1 behavioral1/memory/2084-5-0x0000000000400000-0x00000000007B2000-memory.dmp family_raccoon_v1 behavioral1/memory/2084-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4e4122121f0f3a009416fbd1f98583d0dda1cfd6b1d56e1a8f8b160626004a9f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e4122121f0f3a009416fbd1f98583d0dda1cfd6b1d56e1a8f8b160626004a9f.exe