General

  • Target

    fe7131cf6c341ca903692d41431a00cc_JaffaCakes118

  • Size

    493KB

  • Sample

    240421-e6qdlabe71

  • MD5

    fe7131cf6c341ca903692d41431a00cc

  • SHA1

    bf60c200a30d30fce85c142de2322e9ef67124e0

  • SHA256

    634f511eb76b80e93dda9725c78a7f81ce56e55d20f1a8054f158fa74474acfc

  • SHA512

    fdee53acc211562de78a4e3af0c7eb431d36937fba74dabf349c64ce1bc626b60af4a6570aa105dd3062c1baf0af108aa8397a0d31cd9b036ba7d6001573cda6

  • SSDEEP

    12288:1st56BjrelBW6dGC+SoeQkmRWEoLpSEijcSHTGhO:1stABnelNYSoeQkmRfoLJsjGhO

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

5944ea4a7ef06637c8c156587128728b27948dd2

Attributes
  • url4cnc

    https://telete.in/justoprostohello

rc4.plain
rc4.plain

Targets

    • Target

      fe7131cf6c341ca903692d41431a00cc_JaffaCakes118

    • Size

      493KB

    • MD5

      fe7131cf6c341ca903692d41431a00cc

    • SHA1

      bf60c200a30d30fce85c142de2322e9ef67124e0

    • SHA256

      634f511eb76b80e93dda9725c78a7f81ce56e55d20f1a8054f158fa74474acfc

    • SHA512

      fdee53acc211562de78a4e3af0c7eb431d36937fba74dabf349c64ce1bc626b60af4a6570aa105dd3062c1baf0af108aa8397a0d31cd9b036ba7d6001573cda6

    • SSDEEP

      12288:1st56BjrelBW6dGC+SoeQkmRWEoLpSEijcSHTGhO:1stABnelNYSoeQkmRfoLJsjGhO

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Tasks