General

  • Target

    d83a47429ff68f786d2f4392fe7b0af6_JaffaCakes118

  • Size

    562KB

  • Sample

    241208-v621dsvqbr

  • MD5

    d83a47429ff68f786d2f4392fe7b0af6

  • SHA1

    f3a05ac0996c61a7eafb37015564d7c2451994b5

  • SHA256

    acf073ae5f8b4e643367dc746674f1e228ecc8e94e9327a70b176b21a0dda604

  • SHA512

    61681286b52ee4b54b94938b018191a282d7ac40adf92d1e30c541c595995c8313c4a21b8172c7e2ed8eae7f3354b3d381c1072587c75cf178b2fecb5d0da8a8

  • SSDEEP

    12288:NJZ0lilpy9EBBD6QzKMVle8NGL+h2kVU+tTmOzaby0Fy4:6lilr2SlX522dKNb384

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      d83a47429ff68f786d2f4392fe7b0af6_JaffaCakes118

    • Size

      562KB

    • MD5

      d83a47429ff68f786d2f4392fe7b0af6

    • SHA1

      f3a05ac0996c61a7eafb37015564d7c2451994b5

    • SHA256

      acf073ae5f8b4e643367dc746674f1e228ecc8e94e9327a70b176b21a0dda604

    • SHA512

      61681286b52ee4b54b94938b018191a282d7ac40adf92d1e30c541c595995c8313c4a21b8172c7e2ed8eae7f3354b3d381c1072587c75cf178b2fecb5d0da8a8

    • SSDEEP

      12288:NJZ0lilpy9EBBD6QzKMVle8NGL+h2kVU+tTmOzaby0Fy4:6lilr2SlX522dKNb384

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks