Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 07:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_788f45ada2b264a9ea458f7d125571b0.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_788f45ada2b264a9ea458f7d125571b0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_788f45ada2b264a9ea458f7d125571b0.exe
-
Size
539KB
-
MD5
788f45ada2b264a9ea458f7d125571b0
-
SHA1
cc7cbce75f3f0c2e9eeb5c16f3b0cb690aa46aad
-
SHA256
75b40afc06895b53f4a90d06c0b6b0e6b72a2c34883dfd151bfbac51701576c0
-
SHA512
7151982e5270c10869a1bbeb8329ec884aff1ec46925fe0bbbe07c70c3c279fe41c48fbf56835fece6341db772fdd98b142dab66d0d84e3f70422906d74de181
-
SSDEEP
12288:cFLz8rA4TmF2Gfhk0AYumXdw/9ZO9gEwZGEX8cA0/M:Sk3TORlAYumXo9ZO9ssEv
Malware Config
Extracted
raccoon
5249862c20af324bd38c0aae0d5ea8e5ac16674d
-
url4cnc
http://telegatt.top/br33smithyou
http://telegka.top/br33smithyou
http://telegin.top/br33smithyou
https://t.me/br33smithyou
Signatures
-
Raccoon Stealer V1 payload 6 IoCs
resource yara_rule behavioral2/memory/336-2-0x0000000004B50000-0x0000000004BDE000-memory.dmp family_raccoon_v1 behavioral2/memory/336-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/336-5-0x0000000000400000-0x0000000002F4E000-memory.dmp family_raccoon_v1 behavioral2/memory/336-6-0x0000000004B50000-0x0000000004BDE000-memory.dmp family_raccoon_v1 behavioral2/memory/336-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/336-14-0x0000000000400000-0x0000000002F4E000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_788f45ada2b264a9ea458f7d125571b0.exe