General

  • Target

    d92038c29ec3f08c2b0a8ad7928dcabd_JaffaCakes118

  • Size

    619KB

  • Sample

    241209-mcl33syqek

  • MD5

    d92038c29ec3f08c2b0a8ad7928dcabd

  • SHA1

    2a446ef3e1122298f7cfedbb490fe8a06ad51047

  • SHA256

    4a3c968cc4204a0eac251bf3be98f56e130b7b7693c498814f222c037165c83b

  • SHA512

    7e431ab34d299db45551529b6bc698aa16e32b2a4979068e124d57c815468e51c4278a72633b2fdc354b89ddd2d567fd2d394adb0e015546932473f80d354f38

  • SSDEEP

    12288:XxRhfti5cBRo/gsca21DxrDLXTxrSYn4nkA8ViEw8uV+Tv6hexhrf2wQ:X9VUcBXDxb9rSka8FbbD2w

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

c8a4bc819c641415a3c45622368953a684036cdb

Attributes
  • url4cnc

    https://telete.in/jjbadb0y

rc4.plain
rc4.plain

Targets

    • Target

      d92038c29ec3f08c2b0a8ad7928dcabd_JaffaCakes118

    • Size

      619KB

    • MD5

      d92038c29ec3f08c2b0a8ad7928dcabd

    • SHA1

      2a446ef3e1122298f7cfedbb490fe8a06ad51047

    • SHA256

      4a3c968cc4204a0eac251bf3be98f56e130b7b7693c498814f222c037165c83b

    • SHA512

      7e431ab34d299db45551529b6bc698aa16e32b2a4979068e124d57c815468e51c4278a72633b2fdc354b89ddd2d567fd2d394adb0e015546932473f80d354f38

    • SSDEEP

      12288:XxRhfti5cBRo/gsca21DxrDLXTxrSYn4nkA8ViEw8uV+Tv6hexhrf2wQ:X9VUcBXDxb9rSka8FbbD2w

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks