General

  • Target

    JaffaCakes118_853a932c1c6de5586f230ea96d2b95c41f763e467324e322dfc8357addbe026f

  • Size

    1.7MB

  • Sample

    241230-we78rstrfs

  • MD5

    164018e90225848894c7e525d58521c5

  • SHA1

    1333fa8fc71040c220147fd498ce3d5d641d443a

  • SHA256

    853a932c1c6de5586f230ea96d2b95c41f763e467324e322dfc8357addbe026f

  • SHA512

    d74c6a31be102652d7834a5fdb502507afe51ebc485b1224bf94cd87c3878b0a7e978e7f9ea056a4992aa5a67b7596978d206ac316f3e807b4d89f50a0e088b5

  • SSDEEP

    6144:4IRV944br3TBZgR9EIErbqMeb8vPLA9nMMUfe0U9tyVcf6c936Jphp+LU42:4wV9fbrDBiSrWMHL8gMyc936bOwJ

Malware Config

Extracted

Family

raccoon

Botnet

b4f472421ce1f18efd9f610339c3dae1

C2

http://77.73.134.30/

Attributes
  • user_agent

    20112211

xor.plain

Targets

    • Target

      Setup.exe

    • Size

      425.2MB

    • MD5

      6cba7afb7fb7c47593af39003064905d

    • SHA1

      045a6dd9336cfd8a4b61f576448eb9ea22ec743d

    • SHA256

      2fe86beaad21234ac949e2a152c827e9a70e9735f62b92d7cdc90e9d433e55cf

    • SHA512

      cad4b8f96e4d5214c4ce8285ffc452babe0872c0681ecc77ecd8f13566725156f0622835a9c7e5260bd02ac574918ec983cf6ca92b4061c8fd44c90dfb08d230

    • SSDEEP

      24576:Gpo7zz2EXOOJxrPRArAVcGV6jY/tKYjl:ZzZdCucGV6U/t

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V2 payload

    • Raccoon family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks