General

  • Target

    43883777c9e6ca36de86c7db9f443376_JaffaCakes118

  • Size

    645KB

  • Sample

    241014-wt45nasgkm

  • MD5

    43883777c9e6ca36de86c7db9f443376

  • SHA1

    3572aac4fb15bb70b2ba0a524063e7ae72332692

  • SHA256

    7a6a24f9bc07388b4a27beba0b2c25c4c7800d3e707e0959ff667b431722ad17

  • SHA512

    2782f62f754e1f855260d81748805a851e72509ec483054e00fbd146bddcb5e60181263a05bab8c913790c759a9c7d3867b11fef7b8f12b0697cd8588a63bc52

  • SSDEEP

    12288:25393whFOBBXfrftti0OjLvit/TGbqkXbyWYnxO3OtdqUtADTw:253uhFSfJtiDXiRwqkXbypnx9tbADTw

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

e2b58b2c24d80fcfd249021c5a21ac97c09e40a1

Attributes
  • url4cnc

    https://telete.in/mohibrainos

rc4.plain
rc4.plain

Targets

    • Target

      43883777c9e6ca36de86c7db9f443376_JaffaCakes118

    • Size

      645KB

    • MD5

      43883777c9e6ca36de86c7db9f443376

    • SHA1

      3572aac4fb15bb70b2ba0a524063e7ae72332692

    • SHA256

      7a6a24f9bc07388b4a27beba0b2c25c4c7800d3e707e0959ff667b431722ad17

    • SHA512

      2782f62f754e1f855260d81748805a851e72509ec483054e00fbd146bddcb5e60181263a05bab8c913790c759a9c7d3867b11fef7b8f12b0697cd8588a63bc52

    • SSDEEP

      12288:25393whFOBBXfrftti0OjLvit/TGbqkXbyWYnxO3OtdqUtADTw:253uhFSfJtiDXiRwqkXbypnx9tbADTw

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks