General

  • Target

    eb101021206b19a143db8cf8f4f7b339_JaffaCakes118

  • Size

    497KB

  • Sample

    240410-pmt8jsaf91

  • MD5

    eb101021206b19a143db8cf8f4f7b339

  • SHA1

    59f33eea669086caa3325779600baba3f1fe4a68

  • SHA256

    729dcbfe25909e8f58774f8ed1442ba3e4ccaf7d865317e0991fa087e08a55dd

  • SHA512

    19833af94913ae8aedbc94c230d40fa4cf89697f9acee1fabee5658b981377f0640ec25ee5950d5589a0c5dd43ef105e9e47a6809bd77c3b6515db13117d1bf4

  • SSDEEP

    12288:y2m4C/CWl03mCZC+iBTDlZgHygzN9Zjuq49unWELeQht:+4CL+C+illZgHZND4pjQ

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

16a39305e75d7034b96e725c3f1dd72b36d25c64

Attributes
  • url4cnc

    https://telete.in/hi3krasav4ik

rc4.plain
1
$Z2s`ten\@bE9vzR
rc4.plain
1
980a13e7267d6c8080984819ba91e660

Targets

    • Target

      eb101021206b19a143db8cf8f4f7b339_JaffaCakes118

    • Size

      497KB

    • MD5

      eb101021206b19a143db8cf8f4f7b339

    • SHA1

      59f33eea669086caa3325779600baba3f1fe4a68

    • SHA256

      729dcbfe25909e8f58774f8ed1442ba3e4ccaf7d865317e0991fa087e08a55dd

    • SHA512

      19833af94913ae8aedbc94c230d40fa4cf89697f9acee1fabee5658b981377f0640ec25ee5950d5589a0c5dd43ef105e9e47a6809bd77c3b6515db13117d1bf4

    • SSDEEP

      12288:y2m4C/CWl03mCZC+iBTDlZgHygzN9Zjuq49unWELeQht:+4CL+C+illZgHZND4pjQ

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.