Analysis
-
max time kernel
110s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
4e4122121f0f3a009416fbd1f98583d0dda1cfd6b1d56e1a8f8b160626004a9f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4e4122121f0f3a009416fbd1f98583d0dda1cfd6b1d56e1a8f8b160626004a9f.exe
Resource
win10v2004-20241007-en
General
-
Target
4e4122121f0f3a009416fbd1f98583d0dda1cfd6b1d56e1a8f8b160626004a9f.exe
-
Size
512KB
-
MD5
1a7dea0d24ce41cde8fcf84824aa3c41
-
SHA1
ca74c948d601facb6804d2d57ecb8aec2be23be5
-
SHA256
4e4122121f0f3a009416fbd1f98583d0dda1cfd6b1d56e1a8f8b160626004a9f
-
SHA512
a4a21a75bb046795859f9b16e94cfab1561fd69165c1eecf1b193a46aa54a895ee01c4b9c84228fc3b62e86b0b1fd537c50412e5c0a93d1fb933f48fe6bff197
-
SSDEEP
12288:oDykdg0C7FpRIRfxzl72hef1vDs6ob0fqMcjgSunrCAb6nk/:oekdu7NIR9whef1vDRVSVerOk/
Malware Config
Extracted
raccoon
7ebf9b416b72a203df65383eec899dc689d2c3d7
-
url4cnc
http://telegatt.top/agrybirdsgamerept
http://telegka.top/agrybirdsgamerept
http://telegin.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Raccoon Stealer V1 payload 6 IoCs
resource yara_rule behavioral2/memory/3408-2-0x0000000002520000-0x00000000025AE000-memory.dmp family_raccoon_v1 behavioral2/memory/3408-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/3408-6-0x0000000002520000-0x00000000025AE000-memory.dmp family_raccoon_v1 behavioral2/memory/3408-5-0x0000000000400000-0x00000000007B2000-memory.dmp family_raccoon_v1 behavioral2/memory/3408-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/3408-14-0x0000000000400000-0x00000000007B2000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e4122121f0f3a009416fbd1f98583d0dda1cfd6b1d56e1a8f8b160626004a9f.exe