Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 21:01
Static task
static1
Behavioral task
behavioral1
Sample
RAGNAR~1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
RAGNAR~1.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
xxx.exe
Resource
win7-20240903-en
General
-
Target
xxx.exe
-
Size
539KB
-
MD5
0d2361786ac8ab9f426ac13c5c1d8118
-
SHA1
b7cb32d675c90bd8776a31e1d0f77145698c8b7f
-
SHA256
643d0fc4c7e7b062d1bdb9dd173a25e9ab8191c30420202a27c4c2f521d6e1ea
-
SHA512
feeee7ec9aae0e794cd2207d39e74c5482d128d6cf9b26d4e81cd99a0e2316f46bc8bf425e616a53e0b456760b6f6b73fdbab2a71b4c7362d1dff83d171d03e5
-
SSDEEP
12288:0nYalCGHckvIXYSCfOlw+Ch9VXbLGh53NS:qhl5cktBOlwldbqL9
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxx.exe