Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 19:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_323914da622f742415605a6dcc7ff486.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_323914da622f742415605a6dcc7ff486.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_323914da622f742415605a6dcc7ff486.exe
-
Size
581KB
-
MD5
323914da622f742415605a6dcc7ff486
-
SHA1
b7d62845e91845ba3bbbd939294e8acd399f010f
-
SHA256
d1b95b79fc284f50c5ab39c03ba1ebbf79714e0127f3addad7a7b97e23c4a74b
-
SHA512
d076aff4d4f2daf8e6384d61c5cf8734ea857e5cc95fe13f4fada9f354e440ab8f50b311bf8424eeb5e457330a1a9eb6cb9f579276edb44ae15173b670986d2d
-
SSDEEP
12288:Aqpzz08ZRBW/hwSseaojRVIZ74BBSG3kNkrtbXCMOI2yml0dnKv:A+zzFRWw1XojRVCsBp3FXCM9xdK
Malware Config
Extracted
raccoon
7ebf9b416b72a203df65383eec899dc689d2c3d7
-
url4cnc
http://telegatt.top/agrybirdsgamerept
http://telegka.top/agrybirdsgamerept
http://telegin.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Raccoon Stealer V1 payload 6 IoCs
resource yara_rule behavioral1/memory/2228-2-0x00000000007D0000-0x000000000085E000-memory.dmp family_raccoon_v1 behavioral1/memory/2228-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2228-6-0x00000000007D0000-0x000000000085E000-memory.dmp family_raccoon_v1 behavioral1/memory/2228-5-0x0000000000400000-0x00000000007C3000-memory.dmp family_raccoon_v1 behavioral1/memory/2228-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/2228-16-0x0000000000400000-0x00000000007C3000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_323914da622f742415605a6dcc7ff486.exe