Analysis Overview
SHA256
5ba8dc2d86a7644d8e07535d304f4df393dfae1421aee506a0cd9ce1b793f20c
Threat Level: Known bad
The file 81b18236581865612c040a377583e688_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Raccoon
Raccoon Stealer V1 payload
Unsigned PE
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-04-02 02:56
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-02 02:56
Reported
2024-04-02 02:58
Platform
win10v2004-20240226-en
Max time kernel
141s
Max time network
135s
Command Line
Signatures
Raccoon
Raccoon Stealer V1 payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\81b18236581865612c040a377583e688_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\81b18236581865612c040a377583e688_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | telegatt.top | udp |
| US | 8.8.8.8:53 | 138.136.73.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 76.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | telegatt.top | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | telegatt.top | udp |
| US | 8.8.8.8:53 | telegka.top | udp |
| US | 8.8.8.8:53 | 152.33.115.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | telegka.top | udp |
| US | 8.8.8.8:53 | telegka.top | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | telegin.top | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | telegin.top | udp |
| US | 8.8.8.8:53 | telegin.top | udp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| US | 8.8.8.8:53 | 99.167.154.149.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 40.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 219.135.221.88.in-addr.arpa | udp |
Files
memory/4032-1-0x0000000001700000-0x0000000001800000-memory.dmp
memory/4032-2-0x0000000003470000-0x00000000034FE000-memory.dmp
memory/4032-3-0x0000000000400000-0x00000000016FA000-memory.dmp
memory/4032-4-0x0000000000400000-0x00000000016FA000-memory.dmp
memory/4032-6-0x0000000001700000-0x0000000001800000-memory.dmp
memory/4032-7-0x0000000003470000-0x00000000034FE000-memory.dmp
memory/4032-13-0x0000000000400000-0x00000000016FA000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-02 02:56
Reported
2024-04-02 02:58
Platform
win7-20240221-en
Max time kernel
142s
Max time network
124s
Command Line
Signatures
Raccoon
Raccoon Stealer V1 payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\81b18236581865612c040a377583e688_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\81b18236581865612c040a377583e688_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | telegatt.top | udp |
| US | 8.8.8.8:53 | telegka.top | udp |
| US | 8.8.8.8:53 | telegin.top | udp |
| US | 8.8.8.8:53 | t.me | udp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
| NL | 149.154.167.99:443 | t.me | tcp |
Files
memory/1948-1-0x00000000002D0000-0x00000000003D0000-memory.dmp
memory/1948-2-0x0000000002E90000-0x0000000002F1E000-memory.dmp
memory/1948-3-0x0000000000400000-0x00000000016FA000-memory.dmp
memory/1948-6-0x00000000002D0000-0x00000000003D0000-memory.dmp
memory/1948-7-0x0000000002E90000-0x0000000002F1E000-memory.dmp
memory/1948-16-0x0000000000400000-0x00000000016FA000-memory.dmp