Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 14:50
Static task
static1
Behavioral task
behavioral1
Sample
0c8bcf14e466afcdb97bc365381c84c9bcbc2e6aec2f21c52fe58c4b4562659d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0c8bcf14e466afcdb97bc365381c84c9bcbc2e6aec2f21c52fe58c4b4562659d.exe
Resource
win10v2004-20241007-en
General
-
Target
0c8bcf14e466afcdb97bc365381c84c9bcbc2e6aec2f21c52fe58c4b4562659d.exe
-
Size
542KB
-
MD5
79f0548bad4356fb2470ca77b333d27a
-
SHA1
51ede78e800745ab326936aefcd017480d01d3b4
-
SHA256
0c8bcf14e466afcdb97bc365381c84c9bcbc2e6aec2f21c52fe58c4b4562659d
-
SHA512
5b536413f8b27ca3287ce816753cd8dde466f8d48785d034c23f0ffb818f313e08b29888b492d09ac0231899ab899c516733adb9139899f43d5d1808ca9fb11d
-
SSDEEP
12288:93jKEVV4uHmdZdhBUz1WfAQiHqnj18E3FY5TGJ:93j5K901WfAQOs/9J
Malware Config
Extracted
raccoon
7ebf9b416b72a203df65383eec899dc689d2c3d7
-
url4cnc
http://telegatt.top/agrybirdsgamerept
http://telegka.top/agrybirdsgamerept
http://telegin.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2444-2-0x0000000000350000-0x00000000003DE000-memory.dmp family_raccoon_v1 behavioral1/memory/2444-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2444-6-0x0000000000350000-0x00000000003DE000-memory.dmp family_raccoon_v1 behavioral1/memory/2444-5-0x0000000000400000-0x00000000016FA000-memory.dmp family_raccoon_v1 behavioral1/memory/2444-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0c8bcf14e466afcdb97bc365381c84c9bcbc2e6aec2f21c52fe58c4b4562659d.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c8bcf14e466afcdb97bc365381c84c9bcbc2e6aec2f21c52fe58c4b4562659d.exe