General

  • Target

    JaffaCakes118_413dad7a43d0bb7de7668945eb5c9453

  • Size

    593KB

  • Sample

    250101-a6hxas1jap

  • MD5

    413dad7a43d0bb7de7668945eb5c9453

  • SHA1

    f1081247c639912345ee97b37d5394e887e36867

  • SHA256

    a08ab52c88a11cc72043fd662acec687cfcaeb7c573a8b902b2fb15b81feccf4

  • SHA512

    3312f718544fb63d0e7b4a7179aff411c57d5ef3885468c05add75b755886249c51a018d19f32a2e8173773995f30c2c46c760b2c12a83b97968712047d2efbc

  • SSDEEP

    12288:mrMvwPfK8F4XfSV4XEGa2BJhfgBcmEu5rRXrSvmW9GYbH:mrMvl8eXKVdMjfhmnrSvmqH

Malware Config

Extracted

Family

raccoon

Botnet

723d14b565e8f39294f31f86b0ce56cdaee75105

Attributes
  • url4cnc

    http://telegatt.top/jdiamond13

    http://telegka.top/jdiamond13

    http://telegin.top/jdiamond13

    https://t.me/jdiamond13

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_413dad7a43d0bb7de7668945eb5c9453

    • Size

      593KB

    • MD5

      413dad7a43d0bb7de7668945eb5c9453

    • SHA1

      f1081247c639912345ee97b37d5394e887e36867

    • SHA256

      a08ab52c88a11cc72043fd662acec687cfcaeb7c573a8b902b2fb15b81feccf4

    • SHA512

      3312f718544fb63d0e7b4a7179aff411c57d5ef3885468c05add75b755886249c51a018d19f32a2e8173773995f30c2c46c760b2c12a83b97968712047d2efbc

    • SSDEEP

      12288:mrMvwPfK8F4XfSV4XEGa2BJhfgBcmEu5rRXrSvmW9GYbH:mrMvl8eXKVdMjfhmnrSvmqH

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks