Resubmissions

30-11-2024 13:11

241130-qfbnasyper 10

06-10-2024 15:16

241006-snzffaveme 10

24-08-2024 15:38

240824-s231sayemk 10

24-08-2024 05:47

240824-ghd2rsxfrq 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 13:11

General

  • Target

    be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe

  • Size

    541KB

  • MD5

    be01323b80fba9b067b964f32fb09b79

  • SHA1

    3cab41e92e0c6b2cc63e53f7e55b22db566d000a

  • SHA256

    1e89e268686b120ae6e58ebfc87c5a532d227a54c35bc3b01ed1b992503f64e2

  • SHA512

    73fa1a25fa7fccaa874d0f5e450870d93e1710991057e3af423b6b7089f30b046959e7f6f85a0e2c53b6d936b91141b4b33dcbaa676b9489e98c6bdd8d0df871

  • SSDEEP

    12288:HoHoQ2Akjmwt0+jFHCQ3cnXJ9sMuzxp6L:HOoI2mwt0+jd2nsL36L

Malware Config

Extracted

Family

raccoon

Version

1.8.2

Botnet

e672747afc67feb221ca60f8fc9e03adcf10f038

Attributes
  • url4cnc

    http://teletop.top/youyouhell0world

    http://teleta.top/youyouhell0world

    https://t.me/youyouhell0world

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 5 IoCs
  • Raccoon family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\be01323b80fba9b067b964f32fb09b79_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1352-2-0x0000000000650000-0x00000000006DE000-memory.dmp

    Filesize

    568KB

  • memory/1352-1-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/1352-3-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/1352-4-0x00000000007D0000-0x00000000008D0000-memory.dmp

    Filesize

    1024KB

  • memory/1352-5-0x0000000000400000-0x0000000000494000-memory.dmp

    Filesize

    592KB

  • memory/1352-6-0x0000000000650000-0x00000000006DE000-memory.dmp

    Filesize

    568KB

  • memory/1352-7-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB