Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 19:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_323914da622f742415605a6dcc7ff486.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_323914da622f742415605a6dcc7ff486.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_323914da622f742415605a6dcc7ff486.exe
-
Size
581KB
-
MD5
323914da622f742415605a6dcc7ff486
-
SHA1
b7d62845e91845ba3bbbd939294e8acd399f010f
-
SHA256
d1b95b79fc284f50c5ab39c03ba1ebbf79714e0127f3addad7a7b97e23c4a74b
-
SHA512
d076aff4d4f2daf8e6384d61c5cf8734ea857e5cc95fe13f4fada9f354e440ab8f50b311bf8424eeb5e457330a1a9eb6cb9f579276edb44ae15173b670986d2d
-
SSDEEP
12288:Aqpzz08ZRBW/hwSseaojRVIZ74BBSG3kNkrtbXCMOI2yml0dnKv:A+zzFRWw1XojRVCsBp3FXCM9xdK
Malware Config
Extracted
raccoon
7ebf9b416b72a203df65383eec899dc689d2c3d7
-
url4cnc
http://telegatt.top/agrybirdsgamerept
http://telegka.top/agrybirdsgamerept
http://telegin.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Raccoon Stealer V1 payload 6 IoCs
resource yara_rule behavioral2/memory/3084-2-0x0000000002520000-0x00000000025AE000-memory.dmp family_raccoon_v1 behavioral2/memory/3084-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/3084-6-0x0000000002520000-0x00000000025AE000-memory.dmp family_raccoon_v1 behavioral2/memory/3084-5-0x0000000000400000-0x00000000007C3000-memory.dmp family_raccoon_v1 behavioral2/memory/3084-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/3084-18-0x0000000000400000-0x00000000007C3000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_323914da622f742415605a6dcc7ff486.exe