General

  • Target

    JaffaCakes118_33f5a20317fd4bef4f27eac5db4f69fb

  • Size

    582KB

  • Sample

    241231-yw4m1szjfm

  • MD5

    33f5a20317fd4bef4f27eac5db4f69fb

  • SHA1

    45ea744b298fa38d07353e50adaa82e8d3854d86

  • SHA256

    c614fd9a439ee18db9156e3b8d5033137690e386f0cf7d028037fa3cf3503499

  • SHA512

    b3bd3211782548fdda760a89074718f394d15ba796c70d6cbd43cc460d42099d84dbe24790423f790542ed6cb166a857b8b92be19caf60a4bdb10979115ad034

  • SSDEEP

    12288:pVu+BUZ4zTRwt8+AL9bj55pPr6pZKmRxsRerIrRiyImvS8QB:pVu+1TWt8h9vV6pZJxKRiyIx

Malware Config

Extracted

Family

raccoon

Botnet

723d14b565e8f39294f31f86b0ce56cdaee75105

Attributes
  • url4cnc

    http://telegatt.top/jdiamond13

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_33f5a20317fd4bef4f27eac5db4f69fb

    • Size

      582KB

    • MD5

      33f5a20317fd4bef4f27eac5db4f69fb

    • SHA1

      45ea744b298fa38d07353e50adaa82e8d3854d86

    • SHA256

      c614fd9a439ee18db9156e3b8d5033137690e386f0cf7d028037fa3cf3503499

    • SHA512

      b3bd3211782548fdda760a89074718f394d15ba796c70d6cbd43cc460d42099d84dbe24790423f790542ed6cb166a857b8b92be19caf60a4bdb10979115ad034

    • SSDEEP

      12288:pVu+BUZ4zTRwt8+AL9bj55pPr6pZKmRxsRerIrRiyImvS8QB:pVu+1TWt8h9vV6pZJxKRiyIx

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks