Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 11:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a0e1be86600231cf207722c3e3d0da10.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a0e1be86600231cf207722c3e3d0da10.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a0e1be86600231cf207722c3e3d0da10.exe
-
Size
1.1MB
-
MD5
a0e1be86600231cf207722c3e3d0da10
-
SHA1
ab857ce14c931bdf98872c44db1921309aae75a1
-
SHA256
23637601fc7a6c78cc2c3dc9b24de5f6a6361fc048c35a6a6546b52df2183899
-
SHA512
67da9b31a1e9266b01d9f99b4357bbf749688e398d9b3d9ca867b6f5104f383f476c32d50ceb5e3871362b4ea83176d9249e5d682990542c9b1deeb359d9f594
-
SSDEEP
24576:hCV8iNS+v6VqfLsyz5Vmt/LYP8igcOlXu6tk+7/xa4k5ArTaIwbfx:YjSVELvN8t/LYLOlu6tk+rxBktIyfx
Malware Config
Extracted
raccoon
1.8.2
931d69fc7b7e749b0fc5ecbe4199ee96cd6c089d
-
url4cnc
http://telemirror.top/langprothem14
http://tgmirror.top/langprothem14
http://telegatt.top/langprothem14
http://telegka.top/langprothem14
http://telegin.top/langprothem14
https://t.me/langprothem14
Signatures
-
Raccoon Stealer V1 payload 1 IoCs
resource yara_rule behavioral2/memory/4080-0-0x0000000002820000-0x00000000028B1000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a0e1be86600231cf207722c3e3d0da10.exe