General
-
Target
9db2159a7d540f48fbf46d27500811ae_JaffaCakes118
-
Size
546KB
-
Sample
241126-b3s4jaxlfw
-
MD5
9db2159a7d540f48fbf46d27500811ae
-
SHA1
5e851f00a8c630ffd2d51d405db1fc50267dc5bf
-
SHA256
afd91482057baaeb803ad6496ca1616900f37eff30a4fccbd5a1a50632c4a1e6
-
SHA512
25f511006b573ac36043a79c7266f32c57608c83fd81e85c84f040f46d1ca13b6f7694e907bd2d83f2c4b0a35c71cc8f91f28aa2e70d078bb502d88b54f7f41a
-
SSDEEP
12288:Y9yhF9jXnidMiLuFKWl1dI7hVFL6Lzxd6L:M+aMiiUWAYL6L
Static task
static1
Behavioral task
behavioral1
Sample
9db2159a7d540f48fbf46d27500811ae_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9db2159a7d540f48fbf46d27500811ae_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
raccoon
1.8.1
8cec4b984fbf98ab1f444f5e9a6d03ff51011556
-
url4cnc
http://teletop.top/jjbadb0y
http://teleta.top/jjbadb0y
https://t.me/jjbadb0y
Targets
-
-
Target
9db2159a7d540f48fbf46d27500811ae_JaffaCakes118
-
Size
546KB
-
MD5
9db2159a7d540f48fbf46d27500811ae
-
SHA1
5e851f00a8c630ffd2d51d405db1fc50267dc5bf
-
SHA256
afd91482057baaeb803ad6496ca1616900f37eff30a4fccbd5a1a50632c4a1e6
-
SHA512
25f511006b573ac36043a79c7266f32c57608c83fd81e85c84f040f46d1ca13b6f7694e907bd2d83f2c4b0a35c71cc8f91f28aa2e70d078bb502d88b54f7f41a
-
SSDEEP
12288:Y9yhF9jXnidMiLuFKWl1dI7hVFL6Lzxd6L:M+aMiiUWAYL6L
-
Raccoon Stealer V1 payload
-
Raccoon family
-
A potential corporate email address has been identified in the URL: [email protected]
-