General

  • Target

    f0b68ddc0bef98205b22b8bccec05436_JaffaCakes118

  • Size

    468KB

  • Sample

    241214-zy939avjcv

  • MD5

    f0b68ddc0bef98205b22b8bccec05436

  • SHA1

    87a8ca516fbbb6a34bb8f4dd5a6f3930b64e90c9

  • SHA256

    adf56d5514f9ff609943983010d3fc67ac0b29d5f92ac9adc25bafba79bad88a

  • SHA512

    4b052079bcded8571e589cf945430fd0607fa7a2d97d066ee1c60f96787abb2517e6c85ea87f61f2936fdd1e016d7a00a8ba0a5d552d2f13e9808bc2e6a30e7c

  • SSDEEP

    6144:j2nWLbsyDsyW2EGKo1Y4rA6VUzGm5UiWSA1y7UEdRa0sORORDCi:uW8y4yWx8j86V2GmrWSKuUESOC2i

Malware Config

Extracted

Family

raccoon

Botnet

93d3ccba4a3cbd5e268873fc1760b2335272e198

Attributes
  • url4cnc

    https://telete.in/opa4kiprivatem

rc4.plain
rc4.plain

Targets

    • Target

      f0b68ddc0bef98205b22b8bccec05436_JaffaCakes118

    • Size

      468KB

    • MD5

      f0b68ddc0bef98205b22b8bccec05436

    • SHA1

      87a8ca516fbbb6a34bb8f4dd5a6f3930b64e90c9

    • SHA256

      adf56d5514f9ff609943983010d3fc67ac0b29d5f92ac9adc25bafba79bad88a

    • SHA512

      4b052079bcded8571e589cf945430fd0607fa7a2d97d066ee1c60f96787abb2517e6c85ea87f61f2936fdd1e016d7a00a8ba0a5d552d2f13e9808bc2e6a30e7c

    • SSDEEP

      6144:j2nWLbsyDsyW2EGKo1Y4rA6VUzGm5UiWSA1y7UEdRa0sORORDCi:uW8y4yWx8j86V2GmrWSKuUESOC2i

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks