General

  • Target

    ef9ec305233a1d1e0705c1b58170ba4a_JaffaCakes118

  • Size

    613KB

  • Sample

    241214-tqyscsxmcx

  • MD5

    ef9ec305233a1d1e0705c1b58170ba4a

  • SHA1

    9c1e467ae212357a97bd12a1799c2759343463c9

  • SHA256

    1f5d97af06d5f361014a0026bb8fd0f3dd4fd9119a092358a38042e3ee23bf0c

  • SHA512

    4d2d4cd979764bdf0caa113c773c1c9e099cf2962635fef788efed3dd28d47433f99d0cde3b92074f573eda4e912b1787db8cba17841d9fd9a231fff8695b379

  • SSDEEP

    12288:5bu38g1hhiyCCaXNQY0ERzcUKHYjz9Rt7+IA9LpgwiGeaS+6sjDY:5C8gXs7Cz89KHezN7+IA9tEGNDjDY

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

3c5f92faf516d1465cda31b23f6c41b28e34dd73

Attributes
  • url4cnc

    https://telete.in/horslotuselis

rc4.plain
rc4.plain

Targets

    • Target

      ef9ec305233a1d1e0705c1b58170ba4a_JaffaCakes118

    • Size

      613KB

    • MD5

      ef9ec305233a1d1e0705c1b58170ba4a

    • SHA1

      9c1e467ae212357a97bd12a1799c2759343463c9

    • SHA256

      1f5d97af06d5f361014a0026bb8fd0f3dd4fd9119a092358a38042e3ee23bf0c

    • SHA512

      4d2d4cd979764bdf0caa113c773c1c9e099cf2962635fef788efed3dd28d47433f99d0cde3b92074f573eda4e912b1787db8cba17841d9fd9a231fff8695b379

    • SSDEEP

      12288:5bu38g1hhiyCCaXNQY0ERzcUKHYjz9Rt7+IA9LpgwiGeaS+6sjDY:5C8gXs7Cz89KHezN7+IA9tEGNDjDY

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks