Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1a880822417cf8acbd0699791f237825.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1a880822417cf8acbd0699791f237825.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1a880822417cf8acbd0699791f237825.exe
-
Size
593KB
-
MD5
1a880822417cf8acbd0699791f237825
-
SHA1
6f980a2f68b69be2570b7731f60bbdfa982911e7
-
SHA256
e6c0db3287f3e87530b8cb34b99fd469512a8be81c4b84178478cde0d8d97352
-
SHA512
c77abed08d7c08aa55997c8f7b0f543f0479b71c029746d58b40a4ef4461afa76e9118233fce2fc810b29bba4353799337b98082654d5825df31e1b0b0b6a375
-
SSDEEP
12288:r8roxTJCQNN9BQu/eoDr/XjuJJCRrhHwJHyyP0zRxrF/Uh/SdDSC:rkYTJCI5QsVLT0wQJH/0dUh/S
Malware Config
Extracted
raccoon
723d14b565e8f39294f31f86b0ce56cdaee75105
-
url4cnc
http://telegatt.top/jdiamond13
http://telegka.top/jdiamond13
http://telegin.top/jdiamond13
https://t.me/jdiamond13
Signatures
-
Raccoon Stealer V1 payload 6 IoCs
resource yara_rule behavioral1/memory/2420-2-0x0000000000220000-0x00000000002AE000-memory.dmp family_raccoon_v1 behavioral1/memory/2420-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2420-6-0x0000000000220000-0x00000000002AE000-memory.dmp family_raccoon_v1 behavioral1/memory/2420-5-0x0000000000400000-0x00000000007C6000-memory.dmp family_raccoon_v1 behavioral1/memory/2420-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2420-16-0x0000000000400000-0x00000000007C6000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1a880822417cf8acbd0699791f237825.exe