Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
9db2159a7d540f48fbf46d27500811ae_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9db2159a7d540f48fbf46d27500811ae_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9db2159a7d540f48fbf46d27500811ae_JaffaCakes118.exe
-
Size
546KB
-
MD5
9db2159a7d540f48fbf46d27500811ae
-
SHA1
5e851f00a8c630ffd2d51d405db1fc50267dc5bf
-
SHA256
afd91482057baaeb803ad6496ca1616900f37eff30a4fccbd5a1a50632c4a1e6
-
SHA512
25f511006b573ac36043a79c7266f32c57608c83fd81e85c84f040f46d1ca13b6f7694e907bd2d83f2c4b0a35c71cc8f91f28aa2e70d078bb502d88b54f7f41a
-
SSDEEP
12288:Y9yhF9jXnidMiLuFKWl1dI7hVFL6Lzxd6L:M+aMiiUWAYL6L
Malware Config
Extracted
raccoon
1.8.1
8cec4b984fbf98ab1f444f5e9a6d03ff51011556
-
url4cnc
http://teletop.top/jjbadb0y
http://teleta.top/jjbadb0y
https://t.me/jjbadb0y
Signatures
-
Raccoon Stealer V1 payload 5 IoCs
resource yara_rule behavioral2/memory/1256-2-0x0000000000570000-0x00000000005FC000-memory.dmp family_raccoon_v1 behavioral2/memory/1256-3-0x0000000000400000-0x000000000048E000-memory.dmp family_raccoon_v1 behavioral2/memory/1256-5-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/1256-6-0x0000000000570000-0x00000000005FC000-memory.dmp family_raccoon_v1 behavioral2/memory/1256-7-0x0000000000400000-0x000000000048E000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9db2159a7d540f48fbf46d27500811ae_JaffaCakes118.exe