Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    22-06-2024 14:03

General

  • Target

    028324fcaeb320c598aadb6460183c22_JaffaCakes118.exe

  • Size

    546KB

  • MD5

    028324fcaeb320c598aadb6460183c22

  • SHA1

    58494c059b60fd0069829de9f1c391d396cc29ac

  • SHA256

    4a4e1a2d468a912cc0d71fc6699d5b35e80c8d1825ff16f3d91130511e653542

  • SHA512

    da2d3be1b65850c7dbf75db63b8a7134919c92e0b1b35c49f34d01a9d6c19b98fe47f2623aac92be3a4ce8f1e9c1a18e9c329bd87a766647ac8dc30ad35a7949

  • SSDEEP

    12288:WLhpZ9fFGJx+1ILG9+JppzVmX6F168p527JTs7qhqh1zxp6L:WfZ9fFkg9+RzVmX6Fb6Ts7qhqhB36L

Malware Config

Extracted

Family

raccoon

Version

1.8.1

Botnet

5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4

Attributes
  • url4cnc

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\028324fcaeb320c598aadb6460183c22_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\028324fcaeb320c598aadb6460183c22_JaffaCakes118.exe"
    1⤵
      PID:2012

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2012-1-0x0000000000250000-0x0000000000350000-memory.dmp
      Filesize

      1024KB

    • memory/2012-2-0x00000000004A0000-0x0000000000530000-memory.dmp
      Filesize

      576KB

    • memory/2012-3-0x0000000000400000-0x0000000000493000-memory.dmp
      Filesize

      588KB

    • memory/2012-4-0x0000000000400000-0x0000000000496000-memory.dmp
      Filesize

      600KB

    • memory/2012-6-0x0000000000250000-0x0000000000350000-memory.dmp
      Filesize

      1024KB

    • memory/2012-7-0x00000000004A0000-0x0000000000530000-memory.dmp
      Filesize

      576KB

    • memory/2012-8-0x0000000000400000-0x0000000000493000-memory.dmp
      Filesize

      588KB