General

  • Target

    c1b9f4dac849b39a57f8309f0147015d_JaffaCakes118

  • Size

    511KB

  • Sample

    241204-kkemvsvpaj

  • MD5

    c1b9f4dac849b39a57f8309f0147015d

  • SHA1

    cd63763d904d1c9151bee15b91db5e427dc2bf88

  • SHA256

    cb5f581a0b72fbdc1a926ef42cad1664abe69fd1feca0b4f3dce3a71d7e0365d

  • SHA512

    f440bad48dc06940b635cf5700e33b0eb289e038f1c2bd4a542c2d4b82892974c007cf0b57da93f1dca1d5603918e00731445751375ec7517769bd1ddaebd4ca

  • SSDEEP

    12288:BswyFZVS6MTkPjoOZD4XuqQBZ1m4rvqB3+4Y9C5rh:Bswys6wajdZD4XON/9g

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

fa93985ba268e1dd8b72ef392332edcba95ddd45

Attributes
  • url4cnc

    https://telete.in/h_ghaibin2_1

rc4.plain
rc4.plain

Targets

    • Target

      c1b9f4dac849b39a57f8309f0147015d_JaffaCakes118

    • Size

      511KB

    • MD5

      c1b9f4dac849b39a57f8309f0147015d

    • SHA1

      cd63763d904d1c9151bee15b91db5e427dc2bf88

    • SHA256

      cb5f581a0b72fbdc1a926ef42cad1664abe69fd1feca0b4f3dce3a71d7e0365d

    • SHA512

      f440bad48dc06940b635cf5700e33b0eb289e038f1c2bd4a542c2d4b82892974c007cf0b57da93f1dca1d5603918e00731445751375ec7517769bd1ddaebd4ca

    • SSDEEP

      12288:BswyFZVS6MTkPjoOZD4XuqQBZ1m4rvqB3+4Y9C5rh:Bswys6wajdZD4XON/9g

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks