General
-
Target
JaffaCakes118_2e7ecfe9b6cf170c73540e348009f178
-
Size
513KB
-
Sample
241231-w2b4vavper
-
MD5
2e7ecfe9b6cf170c73540e348009f178
-
SHA1
97bb8284353f0eb0ee86c23f98d1249fec2cbcd7
-
SHA256
c3236aee6db7f0f80eb9df9761afd6aff45edcb527c7deb9048c46e6cc84f454
-
SHA512
0f5fbc0a39b06e49f7fdb6b80ac1764a2cb15a79b34ab8a70124364149a9d5f4da60d398b413c03a084dfa2c0b63b7a201e3fe1c8100b0f070866bed204bc91c
-
SSDEEP
12288:3E4P+bYnH/tvQKU4xvZr2mmF286h4cuNoampNj:3r+UH/qKZr5ZCo1
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2e7ecfe9b6cf170c73540e348009f178.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2e7ecfe9b6cf170c73540e348009f178.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
raccoon
723d14b565e8f39294f31f86b0ce56cdaee75105
-
url4cnc
http://telegatt.top/jdiamond13
http://telegka.top/jdiamond13
http://telegin.top/jdiamond13
https://t.me/jdiamond13
Targets
-
-
Target
JaffaCakes118_2e7ecfe9b6cf170c73540e348009f178
-
Size
513KB
-
MD5
2e7ecfe9b6cf170c73540e348009f178
-
SHA1
97bb8284353f0eb0ee86c23f98d1249fec2cbcd7
-
SHA256
c3236aee6db7f0f80eb9df9761afd6aff45edcb527c7deb9048c46e6cc84f454
-
SHA512
0f5fbc0a39b06e49f7fdb6b80ac1764a2cb15a79b34ab8a70124364149a9d5f4da60d398b413c03a084dfa2c0b63b7a201e3fe1c8100b0f070866bed204bc91c
-
SSDEEP
12288:3E4P+bYnH/tvQKU4xvZr2mmF286h4cuNoampNj:3r+UH/qKZr5ZCo1
-
Raccoon Stealer V1 payload
-
Raccoon family
-