General

  • Target

    JaffaCakes118_13b655e6d06c5b7d7b52e3b54da25a58825c18141b36c1d38c6ff950f2909841

  • Size

    6.4MB

  • Sample

    241222-gfvazawlav

  • MD5

    4be9ae3b53cbdea974eac37d07ad60d4

  • SHA1

    58808b74d0a6f2dce1c7c010a4d57e54fc98fa84

  • SHA256

    13b655e6d06c5b7d7b52e3b54da25a58825c18141b36c1d38c6ff950f2909841

  • SHA512

    11ce1a6e8ff35e7eaa60045871faf8c6aa4587830a88cd65397927c8cf2a81c66697eeed2c9b424383d9969b46761acc143b31e9e03d5a828c3ede2276e763d6

  • SSDEEP

    98304:zqSKVCs1aIjfKkSfAvy/pJ2e2UJz47jikpuqvXODMnz3dWIAbaZFMZkMITdg:mEmrjfKk1vy/P2EKiouqf3nz3dlZzzdg

Malware Config

Extracted

Family

raccoon

Botnet

bd3a3a503834ef8e836d8a99d1ecff54

C2

http://77.73.133.7/

Attributes
  • user_agent

    TakeMyPainBack

xor.plain

Targets

    • Target

      38fcb27f39ee2c40d943838fb71fab29ccef8dc1b32cfd7394fbf7569ac3c8c7

    • Size

      7.5MB

    • MD5

      0524b4a4193cd8a1311f03cbd7f8b5ef

    • SHA1

      f0a1379761c930e89a9fe4246310f71230adbe71

    • SHA256

      38fcb27f39ee2c40d943838fb71fab29ccef8dc1b32cfd7394fbf7569ac3c8c7

    • SHA512

      3a995c505e1e8ddaab7efc6cc4b5301938f7d71311ea5eb440e28c6501238a2e189d8ef5a6818dd35f5ad047f78661bed7ebe9268810b63c8f5bfb95f0cca4a8

    • SSDEEP

      196608:3y7ss5VA4hnjXySqkgnQyEO4oNb44HKT1ml30EpNMsEWVV4G:qVAmnpqkHzoNbu5K30EQQVf

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks