General

  • Target

    f0fc2455a7cdd023373fd6bef8b066b1_JaffaCakes118

  • Size

    461KB

  • Sample

    241214-2askeawmcz

  • MD5

    f0fc2455a7cdd023373fd6bef8b066b1

  • SHA1

    9e2a0536d71a558a1b3a0fd76bcb9f79670fdb16

  • SHA256

    86c85206d1b307d93a14394cb78d1910f9dcfd0c4c134bcec227df7ae8cc2b0d

  • SHA512

    c04638b18de0067dacbcf8a0c6547d3cec0bc0e6af8062ba3a26e10c1a888e05658669b5e4530a75d2ef646a7fa64e60a433b54b7d409648ea44eee5011f6ee6

  • SSDEEP

    12288:LDUcyOYZ/QnWcHXiQ8A6NNY+6J6pfjYLLOcSi:UcydqDSrNqL8pfjOSi

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

cd8dc1031358b1aec55cc6bc447df1018b068607

Attributes
  • url4cnc

    https://telete.in/jagressor_kz

rc4.plain
1
$Z2s`ten\@bE9vzR
rc4.plain
1
25ef3d2ceb7c85368a843a6d0ff8291d

Targets

    • Target

      f0fc2455a7cdd023373fd6bef8b066b1_JaffaCakes118

    • Size

      461KB

    • MD5

      f0fc2455a7cdd023373fd6bef8b066b1

    • SHA1

      9e2a0536d71a558a1b3a0fd76bcb9f79670fdb16

    • SHA256

      86c85206d1b307d93a14394cb78d1910f9dcfd0c4c134bcec227df7ae8cc2b0d

    • SHA512

      c04638b18de0067dacbcf8a0c6547d3cec0bc0e6af8062ba3a26e10c1a888e05658669b5e4530a75d2ef646a7fa64e60a433b54b7d409648ea44eee5011f6ee6

    • SSDEEP

      12288:LDUcyOYZ/QnWcHXiQ8A6NNY+6J6pfjYLLOcSi:UcydqDSrNqL8pfjOSi

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.