Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2025, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-20_a6ee68a3af1a97be5140f8bbe8e1951f_amadey_rhadamanthys_sakula_smoke-loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-20_a6ee68a3af1a97be5140f8bbe8e1951f_amadey_rhadamanthys_sakula_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-20_a6ee68a3af1a97be5140f8bbe8e1951f_amadey_rhadamanthys_sakula_smoke-loader.exe
-
Size
537KB
-
MD5
a6ee68a3af1a97be5140f8bbe8e1951f
-
SHA1
ab464d5c1b4805ba26b9aabdd4befca1c7638ce7
-
SHA256
4eb1537b1b1fac89e3a5b1c40b80500a6385e3a3601ec903971d88fa00740232
-
SHA512
1030706251ab9b806dd52e5d012e3daeaaab707465dafca0fb2382ae2d0a69764361b0904da36dea9df855f5f6563dd6233f9a5f68b490e141307915e24938b9
-
SSDEEP
6144:Vel/lJDNV7o6kIhrse2oHb9/SWGkI/MXYmNsdpjL0Dba9hO5EbDM0/:MZD7bkIB5kjM/sEoO5EbDt
Malware Config
Extracted
raccoon
1.7.3
e593428d572f64087cbbaacf2f970ff1f26a86b7
-
url4cnc
https://telete.in/opa4kiprivatem
Signatures
-
Raccoon Stealer V1 payload 4 IoCs
resource yara_rule behavioral2/memory/452-2-0x0000000002830000-0x00000000028C3000-memory.dmp family_raccoon_v1 behavioral2/memory/452-3-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/452-6-0x0000000002830000-0x00000000028C3000-memory.dmp family_raccoon_v1 behavioral2/memory/452-7-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 -
Raccoon family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-20_a6ee68a3af1a97be5140f8bbe8e1951f_amadey_rhadamanthys_sakula_smoke-loader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-20_a6ee68a3af1a97be5140f8bbe8e1951f_amadey_rhadamanthys_sakula_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-20_a6ee68a3af1a97be5140f8bbe8e1951f_amadey_rhadamanthys_sakula_smoke-loader.exe"1⤵
- System Location Discovery: System Language Discovery
PID:452