General

  • Target

    JaffaCakes118_3d2517f7ac951a1ccbd61bd0310966b5

  • Size

    542KB

  • Sample

    241231-23g95stpht

  • MD5

    3d2517f7ac951a1ccbd61bd0310966b5

  • SHA1

    b24ef373276d7b38eed507097ae72b6896d112df

  • SHA256

    81f6f29613a28ada6beccd7455b81e42e87d95ea13bd8cbcd35cdfd09f706e17

  • SHA512

    107d62ec291201c2787fd7eba2db4fddefc69373df2fb13c3db4ba8f780c0560f488d218f79247b34f333babecdb69ef94c3b141ab2c8d4309ac99c1a56ca11c

  • SSDEEP

    12288:ToWlFr1qkahZRjKbbrz4BovZbPCBtUd3rPZJwZGEX8cA0/MP:T1dP0KfYBo9PUtmhysEv6

Malware Config

Extracted

Family

raccoon

Botnet

cbc29c9ccf1e04407d2e6513fba49a5c24434afe

Attributes
  • url4cnc

    http://telegatt.top/jdiamond13

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_3d2517f7ac951a1ccbd61bd0310966b5

    • Size

      542KB

    • MD5

      3d2517f7ac951a1ccbd61bd0310966b5

    • SHA1

      b24ef373276d7b38eed507097ae72b6896d112df

    • SHA256

      81f6f29613a28ada6beccd7455b81e42e87d95ea13bd8cbcd35cdfd09f706e17

    • SHA512

      107d62ec291201c2787fd7eba2db4fddefc69373df2fb13c3db4ba8f780c0560f488d218f79247b34f333babecdb69ef94c3b141ab2c8d4309ac99c1a56ca11c

    • SSDEEP

      12288:ToWlFr1qkahZRjKbbrz4BovZbPCBtUd3rPZJwZGEX8cA0/MP:T1dP0KfYBo9PUtmhysEv6

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks