General

  • Target

    JaffaCakes118_b041a67fe3cad8022abf91a9757114c51ff04e85b33c2fa155f9116b011b8d84

  • Size

    188KB

  • Sample

    241222-hlfkfaykgr

  • MD5

    afeecd09dd8254f2ca7f6fdb56381373

  • SHA1

    4215dbdded698c18d18c6015b04697b604caf55e

  • SHA256

    b041a67fe3cad8022abf91a9757114c51ff04e85b33c2fa155f9116b011b8d84

  • SHA512

    280e86bf25f6412912749dbf5c9686c6f0a2971fb6f66a7767fb20c2fac88a8305abd1634ea38aca320531f1f53feb313dfc60ba697a38e35ad13f8768d34ab3

  • SSDEEP

    3072:0mUiGXHhP98j5VYiFGTOZYVJO5a1GjVs4D3N26Y2P0RWvc1Ah/ZaKksx8nU/75wn:OBujxITOZYVJO5aQjVs4LxYXRucWNZT

Malware Config

Extracted

Family

raccoon

Botnet

bd3a3a503834ef8e836d8a99d1ecff54

C2

http://135.148.104.11/

Attributes
  • user_agent

    TakeMyPainBack

xor.plain

Targets

    • Target

      JaffaCakes118_b041a67fe3cad8022abf91a9757114c51ff04e85b33c2fa155f9116b011b8d84

    • Size

      188KB

    • MD5

      afeecd09dd8254f2ca7f6fdb56381373

    • SHA1

      4215dbdded698c18d18c6015b04697b604caf55e

    • SHA256

      b041a67fe3cad8022abf91a9757114c51ff04e85b33c2fa155f9116b011b8d84

    • SHA512

      280e86bf25f6412912749dbf5c9686c6f0a2971fb6f66a7767fb20c2fac88a8305abd1634ea38aca320531f1f53feb313dfc60ba697a38e35ad13f8768d34ab3

    • SSDEEP

      3072:0mUiGXHhP98j5VYiFGTOZYVJO5a1GjVs4D3N26Y2P0RWvc1Ah/ZaKksx8nU/75wn:OBujxITOZYVJO5aQjVs4LxYXRucWNZT

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon family

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks