General

  • Target

    JaffaCakes118_4f1e8a41c4d75665796f66eeb13e9922

  • Size

    511KB

  • Sample

    250101-k1jlratjaq

  • MD5

    4f1e8a41c4d75665796f66eeb13e9922

  • SHA1

    f92aaf9d344dec6e0b99bc5c39f4d146db6b8ce1

  • SHA256

    08da5cf46e7f11c5b3d86501fd09f2df5b0c855c35d5b8b075fb5b3d173eead4

  • SHA512

    2a7142d9fe826df1a39b853ee57d776851d37ce02904d773802a013505e56d3afe6b44d3d2a335557a9a69e3f4e1929a29f5cad590e9a2945c99efaf6e4f38f9

  • SSDEEP

    12288:d6tT4zQLiHThSTxcOmCCa3FjlTSuHtTAtW:8tEzvkTSOztvftB

Malware Config

Extracted

Family

raccoon

Botnet

ba62f330c1341ada2659b6b789d4c68af51b599d

Attributes
  • url4cnc

    http://telegatt.top/ogaolittlebro2

    http://telegka.top/ogaolittlebro2

    http://telegin.top/ogaolittlebro2

    https://t.me/ogaolittlebro2

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_4f1e8a41c4d75665796f66eeb13e9922

    • Size

      511KB

    • MD5

      4f1e8a41c4d75665796f66eeb13e9922

    • SHA1

      f92aaf9d344dec6e0b99bc5c39f4d146db6b8ce1

    • SHA256

      08da5cf46e7f11c5b3d86501fd09f2df5b0c855c35d5b8b075fb5b3d173eead4

    • SHA512

      2a7142d9fe826df1a39b853ee57d776851d37ce02904d773802a013505e56d3afe6b44d3d2a335557a9a69e3f4e1929a29f5cad590e9a2945c99efaf6e4f38f9

    • SSDEEP

      12288:d6tT4zQLiHThSTxcOmCCa3FjlTSuHtTAtW:8tEzvkTSOztvftB

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

MITRE ATT&CK Enterprise v15

Tasks