Analysis
-
max time kernel
141s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 06:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_906bf68f10d642ba7f5fb9685249db99.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_906bf68f10d642ba7f5fb9685249db99.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_906bf68f10d642ba7f5fb9685249db99.exe
-
Size
581KB
-
MD5
906bf68f10d642ba7f5fb9685249db99
-
SHA1
ddc876cf17c2cc3b38a02f75770522c5cf939ef6
-
SHA256
cc98ee14bc8504ed2dae9d010c7f209775de51f9f31086814e2fb6b42baa7cb5
-
SHA512
500a0c0f422e08fb68a292bc8c2a959be653ee1aef9607070d49bd11255da0e60679dc30517b48831c1ae46fb74aeedc325279bccc7bfaac5a88e752a961b223
-
SSDEEP
12288:hQzY+9+bMw7eyUnFafcqTUiHrC9wahAwgUPHMrpTZg83CJWW4tDM:h69/essQiLwwaFgrZg83LM
Malware Config
Extracted
raccoon
7ebf9b416b72a203df65383eec899dc689d2c3d7
-
url4cnc
http://telegatt.top/agrybirdsgamerept
http://telegka.top/agrybirdsgamerept
http://telegin.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Raccoon Stealer V1 payload 6 IoCs
resource yara_rule behavioral1/memory/1308-2-0x0000000000220000-0x00000000002AE000-memory.dmp family_raccoon_v1 behavioral1/memory/1308-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/1308-6-0x0000000000220000-0x00000000002AE000-memory.dmp family_raccoon_v1 behavioral1/memory/1308-5-0x0000000000400000-0x00000000007C3000-memory.dmp family_raccoon_v1 behavioral1/memory/1308-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral1/memory/1308-16-0x0000000000400000-0x00000000007C3000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_906bf68f10d642ba7f5fb9685249db99.exe