General

  • Target

    f7ba0f7a61b8b51a5e1823d5fd274d12_JaffaCakes118

  • Size

    629KB

  • Sample

    240418-lltzlshc62

  • MD5

    f7ba0f7a61b8b51a5e1823d5fd274d12

  • SHA1

    64b9713a552f1efb9865782c5eb181e4bf6a392c

  • SHA256

    97230d986df3ea5ab1a95966a7cd14ff73744912d34edb7a72776b78440d9293

  • SHA512

    029501cd62f5884a39013dc4515022747f8e40721490086d2d898e6ee257950b75fce19c0126236aaf46ff4268299cdd74ad7d0515484999a422817b76cf8ba8

  • SSDEEP

    12288:6WGdbu38g1hhiyCCaXNQY0ERzcUKHYjzp489c93P7r9r/+ppppppppppppppppp6:6WKC8gXs7Cz89KHezKv1qzyb

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

e1705ddaac9f73881d2b3657a93827c883eac34f

Attributes
  • url4cnc

    https://telete.in/uidesopencardtop

rc4.plain
rc4.plain

Targets

    • Target

      f7ba0f7a61b8b51a5e1823d5fd274d12_JaffaCakes118

    • Size

      629KB

    • MD5

      f7ba0f7a61b8b51a5e1823d5fd274d12

    • SHA1

      64b9713a552f1efb9865782c5eb181e4bf6a392c

    • SHA256

      97230d986df3ea5ab1a95966a7cd14ff73744912d34edb7a72776b78440d9293

    • SHA512

      029501cd62f5884a39013dc4515022747f8e40721490086d2d898e6ee257950b75fce19c0126236aaf46ff4268299cdd74ad7d0515484999a422817b76cf8ba8

    • SSDEEP

      12288:6WGdbu38g1hhiyCCaXNQY0ERzcUKHYjzp489c93P7r9r/+ppppppppppppppppp6:6WKC8gXs7Cz89KHezKv1qzyb

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks