General

  • Target

    dad4027eea53d7f36aa9eedca7e66f23_JaffaCakes118

  • Size

    562KB

  • Sample

    241209-whl5pswkey

  • MD5

    dad4027eea53d7f36aa9eedca7e66f23

  • SHA1

    c38384dbcd541532ecac35f7aec2a09993454303

  • SHA256

    0eb888bce9b8004afc5ff570dda6538606cc9e76cc16c6b856e10172ac9300e8

  • SHA512

    d8b8bb5926585487a7294b8d8d2f867414c9772c90c0b3b8078269d758bbc5f291bc07ad2dd3dbcdf5556c44d6463859694f429cfd18d417e273f28e66ca4a94

  • SSDEEP

    12288:oL4/Wt4b3bWxVoO7ZE8hzUWWi4wMhsCJb3vK4j8SXRY:fWt442gzUWksEbfX8h

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      dad4027eea53d7f36aa9eedca7e66f23_JaffaCakes118

    • Size

      562KB

    • MD5

      dad4027eea53d7f36aa9eedca7e66f23

    • SHA1

      c38384dbcd541532ecac35f7aec2a09993454303

    • SHA256

      0eb888bce9b8004afc5ff570dda6538606cc9e76cc16c6b856e10172ac9300e8

    • SHA512

      d8b8bb5926585487a7294b8d8d2f867414c9772c90c0b3b8078269d758bbc5f291bc07ad2dd3dbcdf5556c44d6463859694f429cfd18d417e273f28e66ca4a94

    • SSDEEP

      12288:oL4/Wt4b3bWxVoO7ZE8hzUWWi4wMhsCJb3vK4j8SXRY:fWt442gzUWksEbfX8h

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks