General

  • Target

    JaffaCakes118_f145c1907d0def14710275984e237522353d364a3e0db3c80da16d927028f3ea

  • Size

    7.9MB

  • Sample

    241222-ppzwtaymbm

  • MD5

    673f03f4bc936698b12814e3733f39e1

  • SHA1

    f63fc01108f7f6fa371116e1e884260cf08ebd26

  • SHA256

    f145c1907d0def14710275984e237522353d364a3e0db3c80da16d927028f3ea

  • SHA512

    42a5090b44694e9f9fe55878d7087b585667eb3bb9c375e552997a60808f600e3224b0f71f1592a808c9d5796df4b64916ce7cdbd7766700b645ad5b07ba5bc6

  • SSDEEP

    196608:/fFcW1loyyEfHCzAWZJLKU7v4650rxEp7h/GzqA3A9tC:lcW1lKEnWjKBqsCp7R4qJC

Malware Config

Extracted

Family

raccoon

Botnet

7cc7e20e8fb40a79ad7a928b913d97ac

C2

http://5.182.39.77/

http://45.67.229.149/

Attributes
  • user_agent

    mozzzzzzzzzzz

xor.plain

Targets

    • Target

      0f0fddacabc294b1f3497b9b97142d0b85e30d2acb646123ac122601c11e7c4e

    • Size

      366.3MB

    • MD5

      82793f75388af5ca540609250ccb2397

    • SHA1

      fe8b0155d2f3cc258aa3408ca75ce396c6a67a7d

    • SHA256

      0f0fddacabc294b1f3497b9b97142d0b85e30d2acb646123ac122601c11e7c4e

    • SHA512

      10b96eb816086589cd80cc097dd3bfe26ad1ff079e0b86e564d4209ec0b7462efb05c926a8c868dc0bb4bb6b4ecf32128def534e749cfd74bef84053bef54b08

    • SSDEEP

      196608:EWntYI5uLBn0H2j76BG3jEd8jquepipoO:EWh50WueA4dlueoH

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks