General

  • Target

    9292c91e8862b1f54b316ac8aee11bc7_JaffaCakes118

  • Size

    492KB

  • Sample

    241124-e5383atqhw

  • MD5

    9292c91e8862b1f54b316ac8aee11bc7

  • SHA1

    875de9a9acea3de8d818aac5b991dcf0cd062092

  • SHA256

    e665bb787c49613e205566af779144156b86b3609c7dcea163dcc8e83f0b5594

  • SHA512

    60bef4bdef43c141821ecf28555185f03f606b15ad427980e9d7b1d16c6d3c5b538d44e611a811737344f8647e6565a081d7f4cc127abf50fb990462c4fff3e7

  • SSDEEP

    6144:4/M/hyUlUO7IEQ5BkUdexAcYRSElCsDv9ueBMeKJPKykoQUXg8n7knGyHM:4/M8fmI/zFPrSYCSv4e50KhoQUDnI

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

83fbe81dd43f775dd8af3cd619f88f428fbd9a96

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      9292c91e8862b1f54b316ac8aee11bc7_JaffaCakes118

    • Size

      492KB

    • MD5

      9292c91e8862b1f54b316ac8aee11bc7

    • SHA1

      875de9a9acea3de8d818aac5b991dcf0cd062092

    • SHA256

      e665bb787c49613e205566af779144156b86b3609c7dcea163dcc8e83f0b5594

    • SHA512

      60bef4bdef43c141821ecf28555185f03f606b15ad427980e9d7b1d16c6d3c5b538d44e611a811737344f8647e6565a081d7f4cc127abf50fb990462c4fff3e7

    • SSDEEP

      6144:4/M/hyUlUO7IEQ5BkUdexAcYRSElCsDv9ueBMeKJPKykoQUXg8n7knGyHM:4/M8fmI/zFPrSYCSv4e50KhoQUDnI

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks