General

  • Target

    35d9aa284dad273ae6ecc08992ffca84_JaffaCakes118

  • Size

    1020KB

  • Sample

    241011-vdm1rsxgpl

  • MD5

    35d9aa284dad273ae6ecc08992ffca84

  • SHA1

    5b98344c8d89ca2831f3b02debb886477ef29725

  • SHA256

    5f58de2b173fd83131e50888e3d355290b24a1b51da3c05f9c975b1524983d30

  • SHA512

    945dec522ae892f1dbbfb9536a8548c641babe126762bfe8e37da0972933a43e4e4dd37744e5f7ea953f7c2a059dac988114a2db10e7f9d4a1ec8b79d1b7d4eb

  • SSDEEP

    24576:om4c3+VbG0AOOy8G+2PMpOYoYm+FArWQdk:tcs0lOw+2PMpOYo1AA

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

d7b6e0cee1cd813ad40c812cf45171cf0360e249

Attributes
  • url4cnc

    https://telete.in/mimipanera11

rc4.plain
rc4.plain

Targets

    • Target

      35d9aa284dad273ae6ecc08992ffca84_JaffaCakes118

    • Size

      1020KB

    • MD5

      35d9aa284dad273ae6ecc08992ffca84

    • SHA1

      5b98344c8d89ca2831f3b02debb886477ef29725

    • SHA256

      5f58de2b173fd83131e50888e3d355290b24a1b51da3c05f9c975b1524983d30

    • SHA512

      945dec522ae892f1dbbfb9536a8548c641babe126762bfe8e37da0972933a43e4e4dd37744e5f7ea953f7c2a059dac988114a2db10e7f9d4a1ec8b79d1b7d4eb

    • SSDEEP

      24576:om4c3+VbG0AOOy8G+2PMpOYoYm+FArWQdk:tcs0lOw+2PMpOYo1AA

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks