General

  • Target

    JaffaCakes118_dce4e4783ab5819869baae8b98812aabe7654ba2ff9d1e033548a52af93e89a5

  • Size

    727.3MB

  • Sample

    241229-ghqesstrfl

  • MD5

    881cbc2da4c6467aec519f4909371af8

  • SHA1

    ec9c0f602456802254ac2659cd0b42ef97d32b62

  • SHA256

    dce4e4783ab5819869baae8b98812aabe7654ba2ff9d1e033548a52af93e89a5

  • SHA512

    e1d3221d3663e09b8258a4b3ad77a201e18a7cc880b359edf1dd9a2123ed48c6b4888f27f7f9bad9b2da6328f5211fe709e94195e76288c9255997612415b098

  • SSDEEP

    196608:M+saKEuW2K/olbQ1fYyKl//g8I62RZeD0DESWxb:MtEufKQlU1fYyyg8I62Ro0ZW

Malware Config

Extracted

Family

raccoon

Botnet

517bb0d640c1242c3f069aab3d1018d6

C2

http://51.195.166.178/

Attributes
  • user_agent

    mozzzzzzzzzzz

rc4.plain

Targets

    • Target

      JaffaCakes118_dce4e4783ab5819869baae8b98812aabe7654ba2ff9d1e033548a52af93e89a5

    • Size

      727.3MB

    • MD5

      881cbc2da4c6467aec519f4909371af8

    • SHA1

      ec9c0f602456802254ac2659cd0b42ef97d32b62

    • SHA256

      dce4e4783ab5819869baae8b98812aabe7654ba2ff9d1e033548a52af93e89a5

    • SHA512

      e1d3221d3663e09b8258a4b3ad77a201e18a7cc880b359edf1dd9a2123ed48c6b4888f27f7f9bad9b2da6328f5211fe709e94195e76288c9255997612415b098

    • SSDEEP

      196608:M+saKEuW2K/olbQ1fYyKl//g8I62RZeD0DESWxb:MtEufKQlU1fYyyg8I62Ro0ZW

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V2 payload

    • Raccoon family

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks