General

  • Target

    8172b1295e56e6a4bf1be0ef039f590d_JaffaCakes118

  • Size

    1.3MB

  • Sample

    241031-d2ekvsxlh1

  • MD5

    8172b1295e56e6a4bf1be0ef039f590d

  • SHA1

    2bd1738668ccf437d911767aa1ef405e1517fbf7

  • SHA256

    22d051ccc836061b416f4313e7d80a4a7ebd7ccddd98e76e237c77d7acc448bf

  • SHA512

    3ca699cd1a52ff81d75a99fa6ad1818658a9740498c05bd7cfb713ece09e7fe685de4454787e41453b2715b5da24d5e5d33b049f555c92285a46a55d19d6f893

  • SSDEEP

    24576:5EEpLWGqTHBuqCN3B0cwFCZXhmmvAo4UaaELxnM8yDB+VQB3Zb5PeSCfGq/W7S:vHeuqk3D7hIo5alFLy0eB3Zb5e4qZ

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

002b30883c17c8f88409e64eae3f78a3799090e4

Attributes
  • url4cnc

    https://telete.in/uisqrazdvatri

rc4.plain
rc4.plain

Targets

    • Target

      8172b1295e56e6a4bf1be0ef039f590d_JaffaCakes118

    • Size

      1.3MB

    • MD5

      8172b1295e56e6a4bf1be0ef039f590d

    • SHA1

      2bd1738668ccf437d911767aa1ef405e1517fbf7

    • SHA256

      22d051ccc836061b416f4313e7d80a4a7ebd7ccddd98e76e237c77d7acc448bf

    • SHA512

      3ca699cd1a52ff81d75a99fa6ad1818658a9740498c05bd7cfb713ece09e7fe685de4454787e41453b2715b5da24d5e5d33b049f555c92285a46a55d19d6f893

    • SSDEEP

      24576:5EEpLWGqTHBuqCN3B0cwFCZXhmmvAo4UaaELxnM8yDB+VQB3Zb5PeSCfGq/W7S:vHeuqk3D7hIo5alFLy0eB3Zb5e4qZ

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks