General

  • Target

    f41922ec045ae9d97585118ed080cf0f_JaffaCakes118

  • Size

    477KB

  • Sample

    241215-p5zwravkby

  • MD5

    f41922ec045ae9d97585118ed080cf0f

  • SHA1

    b0c644a6bba3c9402dcd77eb9c2fec30542fc38d

  • SHA256

    4b8c4a8eac028219e9061dc6b6cf7042526a56e13c8df7ddbd301b9854b7b19a

  • SHA512

    89ee1251b8587f748bf0ae5ed011d231835370802532604b8ffbceba4352b9992509f53b14e034a4223f98bb0a4151a2e47ca0a0cc1d6bddc17f355747499c15

  • SSDEEP

    6144:4LLJLjTP1hhkWXQBi2W6aWLTLkglQsT3kOGu/ugLSLYrziboCMk/Qnu9zrRgpS6y:4LtHxAVlNPjGumg0HUnWR1GY

Malware Config

Extracted

Family

raccoon

Version

1.7.3

Botnet

8a89272858125c31016bc130ad19557408b8bbe4

Attributes
  • url4cnc

    https://telete.in/jjbadb0y

rc4.plain
rc4.plain

Targets

    • Target

      f41922ec045ae9d97585118ed080cf0f_JaffaCakes118

    • Size

      477KB

    • MD5

      f41922ec045ae9d97585118ed080cf0f

    • SHA1

      b0c644a6bba3c9402dcd77eb9c2fec30542fc38d

    • SHA256

      4b8c4a8eac028219e9061dc6b6cf7042526a56e13c8df7ddbd301b9854b7b19a

    • SHA512

      89ee1251b8587f748bf0ae5ed011d231835370802532604b8ffbceba4352b9992509f53b14e034a4223f98bb0a4151a2e47ca0a0cc1d6bddc17f355747499c15

    • SSDEEP

      6144:4LLJLjTP1hhkWXQBi2W6aWLTLkglQsT3kOGu/ugLSLYrziboCMk/Qnu9zrRgpS6y:4LtHxAVlNPjGumg0HUnWR1GY

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks