Analysis
-
max time kernel
43s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 05:09
Static task
static1
Behavioral task
behavioral1
Sample
030aed84089317c128435998ccebc3fb999d0384066902c1c57cf1a427e7ac2b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
030aed84089317c128435998ccebc3fb999d0384066902c1c57cf1a427e7ac2b.exe
Resource
win10v2004-20241007-en
General
-
Target
030aed84089317c128435998ccebc3fb999d0384066902c1c57cf1a427e7ac2b.exe
-
Size
1.1MB
-
MD5
491ad5b3da7c8fce78998b9e1117c936
-
SHA1
16b46b06daa987fb34e1d1ec7b136c5e6a54d0cf
-
SHA256
030aed84089317c128435998ccebc3fb999d0384066902c1c57cf1a427e7ac2b
-
SHA512
a024a1f8804503958905d21846a8d6473c59d444d7e7705f144db601936efbca2f393bcbe84820dbcafc9eec91532125d708791f22d62e235f3f0cf85e74cee7
-
SSDEEP
24576:NrGC4D73azrTzWBB1M2SgbJKRPwZ9f3EYU:pAnsq67XY
Malware Config
Extracted
raccoon
afb5c633c4650f69312baef49db9dfa4
http://77.73.132.84
-
user_agent
mozzzzzzzzzzz
Signatures
-
Raccoon Stealer V2 payload 4 IoCs
resource yara_rule behavioral1/memory/2376-2-0x0000000000400000-0x0000000000411000-memory.dmp family_raccoon_v2 behavioral1/memory/2376-1-0x00000000002D0000-0x00000000002E6000-memory.dmp family_raccoon_v2 behavioral1/memory/2376-5-0x0000000000400000-0x0000000000411000-memory.dmp family_raccoon_v2 behavioral1/memory/2376-4-0x0000000000400000-0x0000000000518000-memory.dmp family_raccoon_v2 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 030aed84089317c128435998ccebc3fb999d0384066902c1c57cf1a427e7ac2b.exe