General

  • Target

    JaffaCakes118_75fddd0d88efc7ec0bc29b95633c6be8e96247357a49d3f50922ee0ee233f3d1

  • Size

    7.8MB

  • Sample

    241222-j3e6nszqcw

  • MD5

    3fc9e9117798d8846a236d89665dd3eb

  • SHA1

    827b32bc9b97a4d77b331ce7102ebacfbdea44e3

  • SHA256

    75fddd0d88efc7ec0bc29b95633c6be8e96247357a49d3f50922ee0ee233f3d1

  • SHA512

    9692e207a75ec705f8eb0ad1a24bddb416b05f746a892be5fe27cba5810ef6cbda89947e8f7c3437f50452fd5017a4aa6f49933bccbd63cc0dfe92b5bb2141f3

  • SSDEEP

    196608:1BU9ON3qXh6MC4wyIT5glAI9H1z53q4+Wo7HsF8naPlyuNEX:DsXERBr1glAGphL+lIF8naPoeU

Malware Config

Extracted

Family

raccoon

Botnet

8eb14caca01131f5f4ff62ef8a0fcab4

C2

http://5.182.39.77/

http://45.67.229.149/

Attributes
  • user_agent

    mozzzzzzzzzzz

xor.plain

Targets

    • Target

      Setup.exe

    • Size

      366.5MB

    • MD5

      1a59909bd1196572c19064fc8cd0ce57

    • SHA1

      9df8d12b7405ae6205529b2a3fb70b11b84ddc4f

    • SHA256

      fb8bbcd3b86d796755451613963e53fe6beee3537b21d440adf0b32873731442

    • SHA512

      44a9182fc4b5ce841d81292a5d48333fd4099ed395f5f18738bf1bab4cd33a1f91d637d6fd0e6731df435a577745eb4b261d349a0bef77cbb850e8e0f5bc9850

    • SSDEEP

      98304:fqZxjp/7m4TzlME5XeUZfHCl8yeHI/OQCut0h4EPerFGkl+7oVNHZ5tpN+am/JBt:MRpDm4TRNOyCl8P1A38kloOrTUaSqO

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks