General

  • Target

    618155a1c0479bc80c4bd28b7af93162_JaffaCakes118

  • Size

    1.2MB

  • Sample

    241020-ldx2as1blf

  • MD5

    618155a1c0479bc80c4bd28b7af93162

  • SHA1

    542bf77b03bbdc5cc5caf0582b39cdc185e686f6

  • SHA256

    ea712e9759d73168f605f8a55771d4aef62b0bef4b45cb8fd68ed11ea11c2fb4

  • SHA512

    b870452ce96985e431789c2497f4fa46194ce1bf56463e1dc99b98513236b8b01228ec08c734a6c6af739ee00cb715a6cd8a62382febab4678a1055c34d5a461

  • SSDEEP

    24576:7UfmMNj5mGvqJUuGuk4EnHa/Mxl5+9JpZnwrhkN46FI:7Uffh5mGvMu4FMPdoF

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

0343d4da493d263f78921a8724ca6adf05347cfe

Attributes
  • url4cnc

    https://telete.in/jbitchsucks

rc4.plain
rc4.plain

Targets

    • Target

      618155a1c0479bc80c4bd28b7af93162_JaffaCakes118

    • Size

      1.2MB

    • MD5

      618155a1c0479bc80c4bd28b7af93162

    • SHA1

      542bf77b03bbdc5cc5caf0582b39cdc185e686f6

    • SHA256

      ea712e9759d73168f605f8a55771d4aef62b0bef4b45cb8fd68ed11ea11c2fb4

    • SHA512

      b870452ce96985e431789c2497f4fa46194ce1bf56463e1dc99b98513236b8b01228ec08c734a6c6af739ee00cb715a6cd8a62382febab4678a1055c34d5a461

    • SSDEEP

      24576:7UfmMNj5mGvqJUuGuk4EnHa/Mxl5+9JpZnwrhkN46FI:7Uffh5mGvMu4FMPdoF

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks