General

  • Target

    JaffaCakes118_1a880822417cf8acbd0699791f237825

  • Size

    593KB

  • Sample

    241231-pdfc2azkfs

  • MD5

    1a880822417cf8acbd0699791f237825

  • SHA1

    6f980a2f68b69be2570b7731f60bbdfa982911e7

  • SHA256

    e6c0db3287f3e87530b8cb34b99fd469512a8be81c4b84178478cde0d8d97352

  • SHA512

    c77abed08d7c08aa55997c8f7b0f543f0479b71c029746d58b40a4ef4461afa76e9118233fce2fc810b29bba4353799337b98082654d5825df31e1b0b0b6a375

  • SSDEEP

    12288:r8roxTJCQNN9BQu/eoDr/XjuJJCRrhHwJHyyP0zRxrF/Uh/SdDSC:rkYTJCI5QsVLT0wQJH/0dUh/S

Malware Config

Extracted

Family

raccoon

Botnet

723d14b565e8f39294f31f86b0ce56cdaee75105

Attributes
  • url4cnc

    http://telegatt.top/jdiamond13

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_1a880822417cf8acbd0699791f237825

    • Size

      593KB

    • MD5

      1a880822417cf8acbd0699791f237825

    • SHA1

      6f980a2f68b69be2570b7731f60bbdfa982911e7

    • SHA256

      e6c0db3287f3e87530b8cb34b99fd469512a8be81c4b84178478cde0d8d97352

    • SHA512

      c77abed08d7c08aa55997c8f7b0f543f0479b71c029746d58b40a4ef4461afa76e9118233fce2fc810b29bba4353799337b98082654d5825df31e1b0b0b6a375

    • SSDEEP

      12288:r8roxTJCQNN9BQu/eoDr/XjuJJCRrhHwJHyyP0zRxrF/Uh/SdDSC:rkYTJCI5QsVLT0wQJH/0dUh/S

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks