General

  • Target

    b732e1206cd6538ad6fd98ea0a17afa7_JaffaCakes118

  • Size

    1.3MB

  • Sample

    241202-gxh92asqex

  • MD5

    b732e1206cd6538ad6fd98ea0a17afa7

  • SHA1

    3c5eff7e6159e2ca850012dbf345bff7ff480df9

  • SHA256

    9a525086779f276a19bbe2a131cfbd575ade18a4eb6e46f308536d518f0a5210

  • SHA512

    7a7295b869eb9fa3ecd84ee028e12a66629bb507ec0f0c5a5e81061644e5a3335e9d8a0d347d1510a6570d34ee601ab05d79c8611ce5f71df1ecd139d68e5e4f

  • SSDEEP

    24576:xHH1RZy1Gl4jzD+98RqxVXqSDUzzHWPlqXEXQYFIFATwKn/hed0:xXl4quMVXqSEWNHAYFIFhd

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

74bec5afbb1ce85c30df15e910825c3eaa274ac4

Attributes
  • url4cnc

    https://telete.in/berdyshop12

rc4.plain
rc4.plain

Targets

    • Target

      b732e1206cd6538ad6fd98ea0a17afa7_JaffaCakes118

    • Size

      1.3MB

    • MD5

      b732e1206cd6538ad6fd98ea0a17afa7

    • SHA1

      3c5eff7e6159e2ca850012dbf345bff7ff480df9

    • SHA256

      9a525086779f276a19bbe2a131cfbd575ade18a4eb6e46f308536d518f0a5210

    • SHA512

      7a7295b869eb9fa3ecd84ee028e12a66629bb507ec0f0c5a5e81061644e5a3335e9d8a0d347d1510a6570d34ee601ab05d79c8611ce5f71df1ecd139d68e5e4f

    • SSDEEP

      24576:xHH1RZy1Gl4jzD+98RqxVXqSDUzzHWPlqXEXQYFIFATwKn/hed0:xXl4quMVXqSEWNHAYFIFhd

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks