Analysis
-
max time kernel
140s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 20:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bb9e7bee97a01aae02cd11a19dc52151.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bb9e7bee97a01aae02cd11a19dc52151.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_bb9e7bee97a01aae02cd11a19dc52151.exe
-
Size
593KB
-
MD5
bb9e7bee97a01aae02cd11a19dc52151
-
SHA1
ae50bb1d13fddeb8545c4f3bca32422f19c59031
-
SHA256
c04c7f92ef82931a20768d5b5c98c3188995ca2e071bfa38697ac844c2267123
-
SHA512
5dd4ff742604830ab0f8b14dc29354e67a7427f83922954c63f345e7fa2d8a22d5f6d4e351b8cdde964d2cfb29fa3cf4da0c06bbaad233f1c02eb601dd8bda75
-
SSDEEP
12288:Qz1X7hARH2URW4Sp4jYcEsOaiS15WAMCk5115q5TuO6m/ruj88e2U4GXRt:QzZ76zJYjsOatOAMBv52aOA88e2wt
Malware Config
Extracted
raccoon
7ebf9b416b72a203df65383eec899dc689d2c3d7
-
url4cnc
http://telegatt.top/agrybirdsgamerept
http://telegka.top/agrybirdsgamerept
http://telegin.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Signatures
-
Raccoon Stealer V1 payload 6 IoCs
resource yara_rule behavioral2/memory/1912-2-0x00000000023D0000-0x000000000245E000-memory.dmp family_raccoon_v1 behavioral2/memory/1912-3-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/1912-6-0x00000000023D0000-0x000000000245E000-memory.dmp family_raccoon_v1 behavioral2/memory/1912-5-0x0000000000400000-0x00000000007C6000-memory.dmp family_raccoon_v1 behavioral2/memory/1912-7-0x0000000000400000-0x0000000000491000-memory.dmp family_raccoon_v1 behavioral2/memory/1912-16-0x0000000000400000-0x00000000007C6000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bb9e7bee97a01aae02cd11a19dc52151.exe