Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
79ecbafd0f4f41b09260d7ace2ff4a83792a64529e9d54b54eed6f4114c44770.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79ecbafd0f4f41b09260d7ace2ff4a83792a64529e9d54b54eed6f4114c44770.exe
Resource
win10v2004-20241007-en
General
-
Target
79ecbafd0f4f41b09260d7ace2ff4a83792a64529e9d54b54eed6f4114c44770.exe
-
Size
726.3MB
-
MD5
b321d3b1d1e1c919d310fbd4e1222307
-
SHA1
875e35f70c15db8cb4286c5209f560213d680f3d
-
SHA256
79ecbafd0f4f41b09260d7ace2ff4a83792a64529e9d54b54eed6f4114c44770
-
SHA512
d2e74c1a640652f38a3d4e9aaed4441f0a6ea54f32a500b3628703a010f0d966ca9cff0fb6289e994b57c225eebfb43f904af24f119a57a3e8d4f9e704f4d17c
-
SSDEEP
98304:aHx4RroCiEiu9fRWMZ0wgvFhx46uT3eRxWlXpEd7ZVtDObNwBY3XmoIcXojJhe5z:6x4RNdzaFhSz6R8lXQ7NuNwzopothe5z
Malware Config
Extracted
raccoon
b3e62a345d90ee80b30dcc988ddc399f
http://51.68.28.231/
http://5.252.118.129/
-
user_agent
x
Signatures
-
Raccoon Stealer V2 payload 3 IoCs
resource yara_rule behavioral1/memory/800-38-0x0000000000400000-0x0000000000DB6000-memory.dmp family_raccoon_v2 behavioral1/memory/800-40-0x0000000000400000-0x0000000000DB6000-memory.dmp family_raccoon_v2 behavioral1/memory/800-41-0x0000000000400000-0x0000000000DB6000-memory.dmp family_raccoon_v2 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79ecbafd0f4f41b09260d7ace2ff4a83792a64529e9d54b54eed6f4114c44770.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 800 79ecbafd0f4f41b09260d7ace2ff4a83792a64529e9d54b54eed6f4114c44770.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\79ecbafd0f4f41b09260d7ace2ff4a83792a64529e9d54b54eed6f4114c44770.exe"C:\Users\Admin\AppData\Local\Temp\79ecbafd0f4f41b09260d7ace2ff4a83792a64529e9d54b54eed6f4114c44770.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:800