General

  • Target

    5768f8cfc548025fd6bfd2a1a1bec1c3_JaffaCakes118

  • Size

    1.3MB

  • Sample

    241018-pj56msyhjn

  • MD5

    5768f8cfc548025fd6bfd2a1a1bec1c3

  • SHA1

    7d126f7f1f581aa9eac45bf8694ddc24ac535457

  • SHA256

    0dc972bc663e43ee2767174235684e6d00a8da038ef42c93c9383ab25cf15d88

  • SHA512

    6237bbbac0b150d07ab5887c4fd23e008c88a2bfcb9bbe8896a066367656490f4a538821602716ea144c1c4d8f939e3ba5022a82343b4195220f974dc6839013

  • SSDEEP

    24576:RvcaMYKoqhlaQJ0zf1w84+PLak+2qJQytYSoeQkmRfoLJst4Gx1:TRX6ZY1xFPOkSYHkqfo41

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

5944ea4a7ef06637c8c156587128728b27948dd2

Attributes
  • url4cnc

    https://telete.in/justoprostohello

rc4.plain
rc4.plain

Targets

    • Target

      5768f8cfc548025fd6bfd2a1a1bec1c3_JaffaCakes118

    • Size

      1.3MB

    • MD5

      5768f8cfc548025fd6bfd2a1a1bec1c3

    • SHA1

      7d126f7f1f581aa9eac45bf8694ddc24ac535457

    • SHA256

      0dc972bc663e43ee2767174235684e6d00a8da038ef42c93c9383ab25cf15d88

    • SHA512

      6237bbbac0b150d07ab5887c4fd23e008c88a2bfcb9bbe8896a066367656490f4a538821602716ea144c1c4d8f939e3ba5022a82343b4195220f974dc6839013

    • SSDEEP

      24576:RvcaMYKoqhlaQJ0zf1w84+PLak+2qJQytYSoeQkmRfoLJst4Gx1:TRX6ZY1xFPOkSYHkqfo41

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks